Feb 12 19:31:23.802688 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:31:23.802706 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:31:23.802715 kernel: BIOS-provided physical RAM map: Feb 12 19:31:23.802721 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:31:23.802726 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 12 19:31:23.802731 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 12 19:31:23.802738 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 12 19:31:23.802743 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 12 19:31:23.802749 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 12 19:31:23.802756 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 12 19:31:23.802761 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 12 19:31:23.802767 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 12 19:31:23.802772 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 12 19:31:23.802778 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 12 19:31:23.802785 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 12 19:31:23.802792 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 12 19:31:23.802797 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 12 19:31:23.802803 kernel: NX (Execute Disable) protection: active Feb 12 19:31:23.802809 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 12 19:31:23.802815 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 12 19:31:23.802820 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 12 19:31:23.802826 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 12 19:31:23.802832 kernel: extended physical RAM map: Feb 12 19:31:23.802837 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:31:23.802843 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 12 19:31:23.802850 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 12 19:31:23.802856 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 12 19:31:23.802862 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 12 19:31:23.802867 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 12 19:31:23.802873 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 12 19:31:23.802879 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable Feb 12 19:31:23.802885 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable Feb 12 19:31:23.802890 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable Feb 12 19:31:23.802896 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable Feb 12 19:31:23.802902 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable Feb 12 19:31:23.802908 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 12 19:31:23.802914 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 12 19:31:23.802920 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 12 19:31:23.802926 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 12 19:31:23.802932 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 12 19:31:23.802941 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 12 19:31:23.802947 kernel: efi: EFI v2.70 by EDK II Feb 12 19:31:23.802953 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 12 19:31:23.802960 kernel: random: crng init done Feb 12 19:31:23.802967 kernel: SMBIOS 2.8 present. Feb 12 19:31:23.802973 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 12 19:31:23.802979 kernel: Hypervisor detected: KVM Feb 12 19:31:23.802985 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:31:23.802992 kernel: kvm-clock: cpu 0, msr 59faa001, primary cpu clock Feb 12 19:31:23.802998 kernel: kvm-clock: using sched offset of 3892044018 cycles Feb 12 19:31:23.803005 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:31:23.803011 kernel: tsc: Detected 2794.750 MHz processor Feb 12 19:31:23.803019 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:31:23.803026 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:31:23.803032 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 12 19:31:23.803039 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:31:23.803045 kernel: Using GB pages for direct mapping Feb 12 19:31:23.803052 kernel: Secure boot disabled Feb 12 19:31:23.803058 kernel: ACPI: Early table checksum verification disabled Feb 12 19:31:23.803064 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 12 19:31:23.803071 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:31:23.803085 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:31:23.803091 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:31:23.803098 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 12 19:31:23.803104 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:31:23.803110 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:31:23.803117 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:31:23.803123 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 12 19:31:23.803130 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 12 19:31:23.803136 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 12 19:31:23.803144 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 12 19:31:23.803151 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 12 19:31:23.803157 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 12 19:31:23.803163 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 12 19:31:23.803170 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 12 19:31:23.803176 kernel: No NUMA configuration found Feb 12 19:31:23.803182 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 12 19:31:23.803189 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 12 19:31:23.803195 kernel: Zone ranges: Feb 12 19:31:23.803202 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:31:23.803209 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 12 19:31:23.803215 kernel: Normal empty Feb 12 19:31:23.803221 kernel: Movable zone start for each node Feb 12 19:31:23.803228 kernel: Early memory node ranges Feb 12 19:31:23.803234 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:31:23.803240 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 12 19:31:23.803247 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 12 19:31:23.803253 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 12 19:31:23.803260 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 12 19:31:23.803267 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 12 19:31:23.803273 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 12 19:31:23.803280 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:31:23.803286 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:31:23.803292 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 12 19:31:23.803299 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:31:23.803305 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 12 19:31:23.803311 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 12 19:31:23.803319 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 12 19:31:23.803325 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 19:31:23.803332 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:31:23.803338 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:31:23.803344 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:31:23.803351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:31:23.803357 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:31:23.803364 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:31:23.803370 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:31:23.803377 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:31:23.803384 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:31:23.803390 kernel: TSC deadline timer available Feb 12 19:31:23.803396 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 12 19:31:23.803402 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 12 19:31:23.803409 kernel: kvm-guest: setup PV sched yield Feb 12 19:31:23.803415 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 12 19:31:23.803421 kernel: Booting paravirtualized kernel on KVM Feb 12 19:31:23.803428 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:31:23.803434 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 12 19:31:23.803442 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 12 19:31:23.803448 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 12 19:31:23.803459 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 12 19:31:23.803467 kernel: kvm-guest: setup async PF for cpu 0 Feb 12 19:31:23.803473 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Feb 12 19:31:23.803480 kernel: kvm-guest: PV spinlocks enabled Feb 12 19:31:23.803487 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:31:23.803494 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 12 19:31:23.803500 kernel: Policy zone: DMA32 Feb 12 19:31:23.803508 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:31:23.803515 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:31:23.803523 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:31:23.803530 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:31:23.803536 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:31:23.803544 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166304K reserved, 0K cma-reserved) Feb 12 19:31:23.803551 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:31:23.803559 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:31:23.803566 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:31:23.803572 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:31:23.803580 kernel: rcu: RCU event tracing is enabled. Feb 12 19:31:23.803587 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:31:23.803594 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:31:23.803600 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:31:23.803607 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:31:23.803614 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:31:23.803622 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 12 19:31:23.803629 kernel: Console: colour dummy device 80x25 Feb 12 19:31:23.803635 kernel: printk: console [ttyS0] enabled Feb 12 19:31:23.803642 kernel: ACPI: Core revision 20210730 Feb 12 19:31:23.803649 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:31:23.803656 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:31:23.803662 kernel: x2apic enabled Feb 12 19:31:23.803669 kernel: Switched APIC routing to physical x2apic. Feb 12 19:31:23.803676 kernel: kvm-guest: setup PV IPIs Feb 12 19:31:23.803692 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:31:23.803699 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 19:31:23.803706 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 12 19:31:23.803713 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 12 19:31:23.803720 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 12 19:31:23.803726 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 12 19:31:23.803733 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:31:23.803740 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:31:23.803747 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:31:23.803755 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:31:23.803762 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 12 19:31:23.803768 kernel: RETBleed: Mitigation: untrained return thunk Feb 12 19:31:23.803775 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:31:23.803782 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:31:23.803789 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:31:23.803796 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:31:23.803803 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:31:23.803810 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:31:23.803817 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:31:23.803824 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:31:23.803830 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:31:23.803837 kernel: LSM: Security Framework initializing Feb 12 19:31:23.803844 kernel: SELinux: Initializing. Feb 12 19:31:23.803851 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:31:23.803857 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:31:23.803864 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 12 19:31:23.803872 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 12 19:31:23.803879 kernel: ... version: 0 Feb 12 19:31:23.803886 kernel: ... bit width: 48 Feb 12 19:31:23.803892 kernel: ... generic registers: 6 Feb 12 19:31:23.803899 kernel: ... value mask: 0000ffffffffffff Feb 12 19:31:23.803906 kernel: ... max period: 00007fffffffffff Feb 12 19:31:23.803912 kernel: ... fixed-purpose events: 0 Feb 12 19:31:23.803919 kernel: ... event mask: 000000000000003f Feb 12 19:31:23.803925 kernel: signal: max sigframe size: 1776 Feb 12 19:31:23.803932 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:31:23.803940 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:31:23.803947 kernel: x86: Booting SMP configuration: Feb 12 19:31:23.803953 kernel: .... node #0, CPUs: #1 Feb 12 19:31:23.803960 kernel: kvm-clock: cpu 1, msr 59faa041, secondary cpu clock Feb 12 19:31:23.803967 kernel: kvm-guest: setup async PF for cpu 1 Feb 12 19:31:23.803973 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Feb 12 19:31:23.803980 kernel: #2 Feb 12 19:31:23.803987 kernel: kvm-clock: cpu 2, msr 59faa081, secondary cpu clock Feb 12 19:31:23.803994 kernel: kvm-guest: setup async PF for cpu 2 Feb 12 19:31:23.804001 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Feb 12 19:31:23.804008 kernel: #3 Feb 12 19:31:23.804015 kernel: kvm-clock: cpu 3, msr 59faa0c1, secondary cpu clock Feb 12 19:31:23.804021 kernel: kvm-guest: setup async PF for cpu 3 Feb 12 19:31:23.804028 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Feb 12 19:31:23.804034 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:31:23.804041 kernel: smpboot: Max logical packages: 1 Feb 12 19:31:23.804048 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 12 19:31:23.804055 kernel: devtmpfs: initialized Feb 12 19:31:23.804063 kernel: x86/mm: Memory block size: 128MB Feb 12 19:31:23.804070 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 12 19:31:23.804083 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 12 19:31:23.804091 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 12 19:31:23.804097 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 12 19:31:23.804104 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 12 19:31:23.804111 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:31:23.804118 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:31:23.804125 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:31:23.804133 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:31:23.804140 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:31:23.804146 kernel: audit: type=2000 audit(1707766282.409:1): state=initialized audit_enabled=0 res=1 Feb 12 19:31:23.804153 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:31:23.804160 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:31:23.804166 kernel: cpuidle: using governor menu Feb 12 19:31:23.804173 kernel: ACPI: bus type PCI registered Feb 12 19:31:23.804180 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:31:23.804187 kernel: dca service started, version 1.12.1 Feb 12 19:31:23.804194 kernel: PCI: Using configuration type 1 for base access Feb 12 19:31:23.804201 kernel: PCI: Using configuration type 1 for extended access Feb 12 19:31:23.804208 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:31:23.804215 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:31:23.804222 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:31:23.804228 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:31:23.804235 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:31:23.804242 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:31:23.804248 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:31:23.804256 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:31:23.804263 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:31:23.804270 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:31:23.804276 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:31:23.804283 kernel: ACPI: Interpreter enabled Feb 12 19:31:23.804290 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 19:31:23.804296 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:31:23.804303 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:31:23.804310 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:31:23.804318 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:31:23.804423 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:31:23.804434 kernel: acpiphp: Slot [3] registered Feb 12 19:31:23.804441 kernel: acpiphp: Slot [4] registered Feb 12 19:31:23.804448 kernel: acpiphp: Slot [5] registered Feb 12 19:31:23.804455 kernel: acpiphp: Slot [6] registered Feb 12 19:31:23.804462 kernel: acpiphp: Slot [7] registered Feb 12 19:31:23.804468 kernel: acpiphp: Slot [8] registered Feb 12 19:31:23.804475 kernel: acpiphp: Slot [9] registered Feb 12 19:31:23.804484 kernel: acpiphp: Slot [10] registered Feb 12 19:31:23.804490 kernel: acpiphp: Slot [11] registered Feb 12 19:31:23.804497 kernel: acpiphp: Slot [12] registered Feb 12 19:31:23.804503 kernel: acpiphp: Slot [13] registered Feb 12 19:31:23.804510 kernel: acpiphp: Slot [14] registered Feb 12 19:31:23.804517 kernel: acpiphp: Slot [15] registered Feb 12 19:31:23.804523 kernel: acpiphp: Slot [16] registered Feb 12 19:31:23.804530 kernel: acpiphp: Slot [17] registered Feb 12 19:31:23.804537 kernel: acpiphp: Slot [18] registered Feb 12 19:31:23.804544 kernel: acpiphp: Slot [19] registered Feb 12 19:31:23.804551 kernel: acpiphp: Slot [20] registered Feb 12 19:31:23.804558 kernel: acpiphp: Slot [21] registered Feb 12 19:31:23.804564 kernel: acpiphp: Slot [22] registered Feb 12 19:31:23.804571 kernel: acpiphp: Slot [23] registered Feb 12 19:31:23.804578 kernel: acpiphp: Slot [24] registered Feb 12 19:31:23.804584 kernel: acpiphp: Slot [25] registered Feb 12 19:31:23.804591 kernel: acpiphp: Slot [26] registered Feb 12 19:31:23.804598 kernel: acpiphp: Slot [27] registered Feb 12 19:31:23.804605 kernel: acpiphp: Slot [28] registered Feb 12 19:31:23.804612 kernel: acpiphp: Slot [29] registered Feb 12 19:31:23.804619 kernel: acpiphp: Slot [30] registered Feb 12 19:31:23.804625 kernel: acpiphp: Slot [31] registered Feb 12 19:31:23.804632 kernel: PCI host bridge to bus 0000:00 Feb 12 19:31:23.804728 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:31:23.804795 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:31:23.804873 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:31:23.804940 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 12 19:31:23.805001 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 12 19:31:23.805060 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:31:23.805304 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:31:23.805395 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:31:23.805474 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:31:23.805546 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 12 19:31:23.805668 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:31:23.805797 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:31:23.805869 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:31:23.805940 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:31:23.806018 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:31:23.806100 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 19:31:23.806176 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 19:31:23.806256 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 12 19:31:23.806328 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 12 19:31:23.806398 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 12 19:31:23.806468 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 12 19:31:23.806537 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 12 19:31:23.806608 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:31:23.806705 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:31:23.806905 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 12 19:31:23.806978 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 12 19:31:23.807048 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 12 19:31:23.807133 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:31:23.807202 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:31:23.807269 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 12 19:31:23.807341 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 12 19:31:23.807416 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:31:23.807484 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 19:31:23.807551 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 12 19:31:23.807617 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 12 19:31:23.807699 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 12 19:31:23.807717 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:31:23.807726 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:31:23.807733 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:31:23.807740 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:31:23.807747 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:31:23.807754 kernel: iommu: Default domain type: Translated Feb 12 19:31:23.807761 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:31:23.807833 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:31:23.807898 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:31:23.807964 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:31:23.807975 kernel: vgaarb: loaded Feb 12 19:31:23.807982 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:31:23.807989 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:31:23.807996 kernel: PTP clock support registered Feb 12 19:31:23.808003 kernel: Registered efivars operations Feb 12 19:31:23.808009 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:31:23.808016 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:31:23.808023 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 12 19:31:23.808029 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 12 19:31:23.808037 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff] Feb 12 19:31:23.808044 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff] Feb 12 19:31:23.808050 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 12 19:31:23.808057 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 12 19:31:23.808063 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:31:23.808070 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:31:23.808085 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:31:23.808093 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:31:23.808099 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:31:23.808107 kernel: pnp: PnP ACPI init Feb 12 19:31:23.808181 kernel: pnp 00:02: [dma 2] Feb 12 19:31:23.808191 kernel: pnp: PnP ACPI: found 6 devices Feb 12 19:31:23.808198 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:31:23.808205 kernel: NET: Registered PF_INET protocol family Feb 12 19:31:23.808211 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:31:23.808218 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:31:23.808225 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:31:23.808234 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:31:23.808240 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:31:23.808247 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:31:23.808254 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:31:23.808261 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:31:23.808268 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:31:23.808274 kernel: NET: Registered PF_XDP protocol family Feb 12 19:31:23.808345 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 12 19:31:23.808425 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 12 19:31:23.808488 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:31:23.808549 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:31:23.808610 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:31:23.808669 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 12 19:31:23.808741 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 12 19:31:23.808811 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:31:23.808878 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:31:23.808951 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:31:23.808961 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:31:23.808968 kernel: Initialise system trusted keyrings Feb 12 19:31:23.808975 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:31:23.808982 kernel: Key type asymmetric registered Feb 12 19:31:23.808990 kernel: Asymmetric key parser 'x509' registered Feb 12 19:31:23.808997 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:31:23.809004 kernel: io scheduler mq-deadline registered Feb 12 19:31:23.809011 kernel: io scheduler kyber registered Feb 12 19:31:23.809019 kernel: io scheduler bfq registered Feb 12 19:31:23.809027 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:31:23.809034 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:31:23.809042 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 19:31:23.809049 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:31:23.809056 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:31:23.809063 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:31:23.809070 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:31:23.809084 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:31:23.809093 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:31:23.809167 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 12 19:31:23.809179 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:31:23.809240 kernel: rtc_cmos 00:05: registered as rtc0 Feb 12 19:31:23.809304 kernel: rtc_cmos 00:05: setting system clock to 2024-02-12T19:31:23 UTC (1707766283) Feb 12 19:31:23.809367 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 12 19:31:23.809376 kernel: efifb: probing for efifb Feb 12 19:31:23.809383 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 12 19:31:23.809391 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 12 19:31:23.809398 kernel: efifb: scrolling: redraw Feb 12 19:31:23.809405 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:31:23.809412 kernel: Console: switching to colour frame buffer device 160x50 Feb 12 19:31:23.809419 kernel: fb0: EFI VGA frame buffer device Feb 12 19:31:23.809428 kernel: pstore: Registered efi as persistent store backend Feb 12 19:31:23.809435 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:31:23.809442 kernel: Segment Routing with IPv6 Feb 12 19:31:23.809449 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:31:23.809457 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:31:23.809464 kernel: Key type dns_resolver registered Feb 12 19:31:23.809471 kernel: IPI shorthand broadcast: enabled Feb 12 19:31:23.809478 kernel: sched_clock: Marking stable (358132674, 94882715)->(476616566, -23601177) Feb 12 19:31:23.809485 kernel: registered taskstats version 1 Feb 12 19:31:23.809493 kernel: Loading compiled-in X.509 certificates Feb 12 19:31:23.809501 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:31:23.809508 kernel: Key type .fscrypt registered Feb 12 19:31:23.809514 kernel: Key type fscrypt-provisioning registered Feb 12 19:31:23.809523 kernel: pstore: Using crash dump compression: deflate Feb 12 19:31:23.809530 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:31:23.809537 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:31:23.809544 kernel: ima: No architecture policies found Feb 12 19:31:23.809551 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:31:23.809559 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:31:23.809567 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:31:23.809574 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:31:23.809581 kernel: Run /init as init process Feb 12 19:31:23.809589 kernel: with arguments: Feb 12 19:31:23.809596 kernel: /init Feb 12 19:31:23.809603 kernel: with environment: Feb 12 19:31:23.809610 kernel: HOME=/ Feb 12 19:31:23.809617 kernel: TERM=linux Feb 12 19:31:23.809625 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:31:23.809634 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:31:23.809643 systemd[1]: Detected virtualization kvm. Feb 12 19:31:23.809651 systemd[1]: Detected architecture x86-64. Feb 12 19:31:23.809658 systemd[1]: Running in initrd. Feb 12 19:31:23.809665 systemd[1]: No hostname configured, using default hostname. Feb 12 19:31:23.809673 systemd[1]: Hostname set to . Feb 12 19:31:23.809699 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:31:23.809707 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:31:23.809714 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:31:23.809721 systemd[1]: Reached target cryptsetup.target. Feb 12 19:31:23.809729 systemd[1]: Reached target paths.target. Feb 12 19:31:23.809736 systemd[1]: Reached target slices.target. Feb 12 19:31:23.809743 systemd[1]: Reached target swap.target. Feb 12 19:31:23.809751 systemd[1]: Reached target timers.target. Feb 12 19:31:23.809760 systemd[1]: Listening on iscsid.socket. Feb 12 19:31:23.809767 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:31:23.809775 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:31:23.809783 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:31:23.809790 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:31:23.809797 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:31:23.809805 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:31:23.809813 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:31:23.809820 systemd[1]: Reached target sockets.target. Feb 12 19:31:23.809829 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:31:23.809836 systemd[1]: Finished network-cleanup.service. Feb 12 19:31:23.809844 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:31:23.809851 systemd[1]: Starting systemd-journald.service... Feb 12 19:31:23.809859 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:31:23.809866 systemd[1]: Starting systemd-resolved.service... Feb 12 19:31:23.809874 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:31:23.809881 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:31:23.809889 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:31:23.809897 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:31:23.809905 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:31:23.809913 kernel: audit: type=1130 audit(1707766283.801:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.809920 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:31:23.809929 kernel: audit: type=1130 audit(1707766283.807:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.809939 systemd-journald[197]: Journal started Feb 12 19:31:23.809976 systemd-journald[197]: Runtime Journal (/run/log/journal/f91538a76be447d7a0818dc286c22485) is 6.0M, max 48.4M, 42.4M free. Feb 12 19:31:23.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.799673 systemd-modules-load[198]: Inserted module 'overlay' Feb 12 19:31:23.811064 systemd[1]: Started systemd-journald.service. Feb 12 19:31:23.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.814723 kernel: audit: type=1130 audit(1707766283.811:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.814726 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:31:23.822701 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:31:23.823637 systemd-resolved[199]: Positive Trust Anchors: Feb 12 19:31:23.823650 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:31:23.823718 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:31:23.824826 kernel: Bridge firewalling registered Feb 12 19:31:23.824202 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 12 19:31:23.826731 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:31:23.829922 kernel: audit: type=1130 audit(1707766283.826:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.828812 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 12 19:31:23.829731 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:31:23.831840 systemd[1]: Started systemd-resolved.service. Feb 12 19:31:23.835540 kernel: audit: type=1130 audit(1707766283.831:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.832511 systemd[1]: Reached target nss-lookup.target. Feb 12 19:31:23.839479 dracut-cmdline[216]: dracut-dracut-053 Feb 12 19:31:23.841805 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:31:23.845003 kernel: SCSI subsystem initialized Feb 12 19:31:23.853287 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:31:23.853324 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:31:23.853334 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:31:23.855838 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 12 19:31:23.856466 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:31:23.860346 kernel: audit: type=1130 audit(1707766283.856:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.857981 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:31:23.864909 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:31:23.867890 kernel: audit: type=1130 audit(1707766283.864:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.898696 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:31:23.908699 kernel: iscsi: registered transport (tcp) Feb 12 19:31:23.927704 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:31:23.927721 kernel: QLogic iSCSI HBA Driver Feb 12 19:31:23.955009 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:31:23.958385 kernel: audit: type=1130 audit(1707766283.954:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.956333 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:31:24.000706 kernel: raid6: avx2x4 gen() 30045 MB/s Feb 12 19:31:24.017702 kernel: raid6: avx2x4 xor() 7219 MB/s Feb 12 19:31:24.034698 kernel: raid6: avx2x2 gen() 32189 MB/s Feb 12 19:31:24.051703 kernel: raid6: avx2x2 xor() 19343 MB/s Feb 12 19:31:24.068697 kernel: raid6: avx2x1 gen() 26676 MB/s Feb 12 19:31:24.085701 kernel: raid6: avx2x1 xor() 15412 MB/s Feb 12 19:31:24.102702 kernel: raid6: sse2x4 gen() 14869 MB/s Feb 12 19:31:24.119703 kernel: raid6: sse2x4 xor() 6966 MB/s Feb 12 19:31:24.136706 kernel: raid6: sse2x2 gen() 16416 MB/s Feb 12 19:31:24.153717 kernel: raid6: sse2x2 xor() 9872 MB/s Feb 12 19:31:24.170698 kernel: raid6: sse2x1 gen() 12338 MB/s Feb 12 19:31:24.188130 kernel: raid6: sse2x1 xor() 7839 MB/s Feb 12 19:31:24.188143 kernel: raid6: using algorithm avx2x2 gen() 32189 MB/s Feb 12 19:31:24.188152 kernel: raid6: .... xor() 19343 MB/s, rmw enabled Feb 12 19:31:24.188160 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:31:24.199699 kernel: xor: automatically using best checksumming function avx Feb 12 19:31:24.287701 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:31:24.295165 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:31:24.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:24.297000 audit: BPF prog-id=7 op=LOAD Feb 12 19:31:24.297000 audit: BPF prog-id=8 op=LOAD Feb 12 19:31:24.298494 systemd[1]: Starting systemd-udevd.service... Feb 12 19:31:24.299469 kernel: audit: type=1130 audit(1707766284.295:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:24.309777 systemd-udevd[400]: Using default interface naming scheme 'v252'. Feb 12 19:31:24.313172 systemd[1]: Started systemd-udevd.service. Feb 12 19:31:24.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:24.314346 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:31:24.324013 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Feb 12 19:31:24.345755 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:31:24.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:24.346671 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:31:24.377495 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:31:24.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:24.404717 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:31:24.408695 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:31:24.412832 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:31:24.412856 kernel: GPT:9289727 != 19775487 Feb 12 19:31:24.412866 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:31:24.412874 kernel: GPT:9289727 != 19775487 Feb 12 19:31:24.414166 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:31:24.414186 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:31:24.419289 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:31:24.419309 kernel: AES CTR mode by8 optimization enabled Feb 12 19:31:24.431699 kernel: libata version 3.00 loaded. Feb 12 19:31:24.434923 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:31:24.437907 kernel: scsi host0: ata_piix Feb 12 19:31:24.438050 kernel: scsi host1: ata_piix Feb 12 19:31:24.439723 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 12 19:31:24.439777 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 12 19:31:24.443205 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:31:24.444559 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (464) Feb 12 19:31:24.446298 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:31:24.447148 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:31:24.455561 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:31:24.464421 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:31:24.466304 systemd[1]: Starting disk-uuid.service... Feb 12 19:31:24.472057 disk-uuid[524]: Primary Header is updated. Feb 12 19:31:24.472057 disk-uuid[524]: Secondary Entries is updated. Feb 12 19:31:24.472057 disk-uuid[524]: Secondary Header is updated. Feb 12 19:31:24.474702 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:31:24.477703 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:31:24.597793 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 12 19:31:24.598032 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 12 19:31:24.628704 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 12 19:31:24.628874 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:31:24.645749 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 12 19:31:25.477971 disk-uuid[525]: The operation has completed successfully. Feb 12 19:31:25.478860 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:31:25.499943 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:31:25.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.500027 systemd[1]: Finished disk-uuid.service. Feb 12 19:31:25.503965 systemd[1]: Starting verity-setup.service... Feb 12 19:31:25.515696 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 12 19:31:25.533346 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:31:25.534805 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:31:25.536519 systemd[1]: Finished verity-setup.service. Feb 12 19:31:25.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.589598 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:31:25.590601 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:31:25.590225 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:31:25.590814 systemd[1]: Starting ignition-setup.service... Feb 12 19:31:25.592541 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:31:25.598200 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:31:25.598224 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:31:25.598237 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:31:25.605700 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:31:25.613322 systemd[1]: Finished ignition-setup.service. Feb 12 19:31:25.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.615184 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:31:25.650561 ignition[634]: Ignition 2.14.0 Feb 12 19:31:25.651038 ignition[634]: Stage: fetch-offline Feb 12 19:31:25.651078 ignition[634]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:31:25.651085 ignition[634]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:31:25.651173 ignition[634]: parsed url from cmdline: "" Feb 12 19:31:25.651176 ignition[634]: no config URL provided Feb 12 19:31:25.651180 ignition[634]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:31:25.651185 ignition[634]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:31:25.651200 ignition[634]: op(1): [started] loading QEMU firmware config module Feb 12 19:31:25.651203 ignition[634]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:31:25.654995 ignition[634]: op(1): [finished] loading QEMU firmware config module Feb 12 19:31:25.657722 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:31:25.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.659000 audit: BPF prog-id=9 op=LOAD Feb 12 19:31:25.660140 systemd[1]: Starting systemd-networkd.service... Feb 12 19:31:25.712521 ignition[634]: parsing config with SHA512: 30f8425d02dfe0bea1eedefb55a365b560629a72a2168a8c8af4d35b420dd18e29345fe40154ef4dd4a7d67ec6a8df4b82afbd75d4c8389dfb2e6f304761a1f3 Feb 12 19:31:25.729338 systemd-networkd[714]: lo: Link UP Feb 12 19:31:25.729349 systemd-networkd[714]: lo: Gained carrier Feb 12 19:31:25.729853 systemd-networkd[714]: Enumeration completed Feb 12 19:31:25.729987 systemd[1]: Started systemd-networkd.service. Feb 12 19:31:25.730098 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:31:25.731043 systemd-networkd[714]: eth0: Link UP Feb 12 19:31:25.731047 systemd-networkd[714]: eth0: Gained carrier Feb 12 19:31:25.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.736104 systemd[1]: Reached target network.target. Feb 12 19:31:25.737673 systemd[1]: Starting iscsiuio.service... Feb 12 19:31:25.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.742496 systemd[1]: Started iscsiuio.service. Feb 12 19:31:25.744221 systemd[1]: Starting iscsid.service... Feb 12 19:31:25.745777 systemd-networkd[714]: eth0: DHCPv4 address 10.0.0.23/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:31:25.748319 iscsid[719]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:31:25.748319 iscsid[719]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:31:25.748319 iscsid[719]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:31:25.748319 iscsid[719]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:31:25.748319 iscsid[719]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:31:25.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.748748 unknown[634]: fetched base config from "system" Feb 12 19:31:25.756830 iscsid[719]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:31:25.749879 ignition[634]: fetch-offline: fetch-offline passed Feb 12 19:31:25.748757 unknown[634]: fetched user config from "qemu" Feb 12 19:31:25.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.749954 ignition[634]: Ignition finished successfully Feb 12 19:31:25.750835 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:31:25.753057 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:31:25.753706 systemd[1]: Starting ignition-kargs.service... Feb 12 19:31:25.756890 systemd[1]: Started iscsid.service. Feb 12 19:31:25.758587 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:31:25.763113 ignition[720]: Ignition 2.14.0 Feb 12 19:31:25.763119 ignition[720]: Stage: kargs Feb 12 19:31:25.763193 ignition[720]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:31:25.763201 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:31:25.764144 ignition[720]: kargs: kargs passed Feb 12 19:31:25.764177 ignition[720]: Ignition finished successfully Feb 12 19:31:25.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.766074 systemd[1]: Finished ignition-kargs.service. Feb 12 19:31:25.766879 systemd[1]: Starting ignition-disks.service... Feb 12 19:31:25.773738 ignition[728]: Ignition 2.14.0 Feb 12 19:31:25.773752 ignition[728]: Stage: disks Feb 12 19:31:25.773860 ignition[728]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:31:25.773871 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:31:25.775253 ignition[728]: disks: disks passed Feb 12 19:31:25.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.776115 systemd[1]: Finished ignition-disks.service. Feb 12 19:31:25.775294 ignition[728]: Ignition finished successfully Feb 12 19:31:25.776741 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:31:25.776935 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:31:25.777151 systemd[1]: Reached target local-fs.target. Feb 12 19:31:25.779376 systemd[1]: Reached target sysinit.target. Feb 12 19:31:25.779582 systemd[1]: Reached target basic.target. Feb 12 19:31:25.784228 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:31:25.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.784602 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:31:25.785519 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:31:25.785844 systemd[1]: Reached target remote-fs.target. Feb 12 19:31:25.788258 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:31:25.795089 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:31:25.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.796218 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:31:25.803720 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.23 Feb 12 19:31:25.803733 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux11'. Feb 12 19:31:25.806314 systemd-fsck[748]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 19:31:25.810449 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:31:25.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.812084 systemd[1]: Mounting sysroot.mount... Feb 12 19:31:25.816702 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:31:25.817126 systemd[1]: Mounted sysroot.mount. Feb 12 19:31:25.817475 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:31:25.819091 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:31:25.819709 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:31:25.819748 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:31:25.819769 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:31:25.821445 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:31:25.822559 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:31:25.826978 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:31:25.830279 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:31:25.833252 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:31:25.836331 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:31:25.856887 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:31:25.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.857961 systemd[1]: Starting ignition-mount.service... Feb 12 19:31:25.858739 systemd[1]: Starting sysroot-boot.service... Feb 12 19:31:25.864150 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:31:25.870713 ignition[801]: INFO : Ignition 2.14.0 Feb 12 19:31:25.870713 ignition[801]: INFO : Stage: mount Feb 12 19:31:25.871891 ignition[801]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:31:25.871891 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:31:25.873385 ignition[801]: INFO : mount: mount passed Feb 12 19:31:25.873385 ignition[801]: INFO : Ignition finished successfully Feb 12 19:31:25.874780 systemd[1]: Finished sysroot-boot.service. Feb 12 19:31:25.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:25.876247 systemd[1]: Finished ignition-mount.service. Feb 12 19:31:25.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:26.542185 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:31:26.547691 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (809) Feb 12 19:31:26.549977 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:31:26.549996 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:31:26.550012 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:31:26.552542 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:31:26.554300 systemd[1]: Starting ignition-files.service... Feb 12 19:31:26.566958 ignition[829]: INFO : Ignition 2.14.0 Feb 12 19:31:26.566958 ignition[829]: INFO : Stage: files Feb 12 19:31:26.568156 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:31:26.568156 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:31:26.569945 ignition[829]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:31:26.569945 ignition[829]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:31:26.569945 ignition[829]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:31:26.572769 ignition[829]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:31:26.572769 ignition[829]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:31:26.572769 ignition[829]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:31:26.572769 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:31:26.572769 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:31:26.570993 unknown[829]: wrote ssh authorized keys file for user: core Feb 12 19:31:27.073374 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:31:27.252779 systemd-networkd[714]: eth0: Gained IPv6LL Feb 12 19:31:27.301571 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:31:27.303656 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:31:27.303656 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:31:27.303656 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:31:27.778350 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:31:28.348096 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:31:28.350423 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:31:28.350423 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:31:28.350423 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 19:31:28.477043 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:31:28.562986 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:31:28.564374 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:31:28.564374 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:31:28.943181 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:31:34.952954 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 19:31:34.952954 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:31:34.956215 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:31:34.956215 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:31:35.132507 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:31:50.291708 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 19:31:50.294382 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:31:50.294382 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:31:50.294382 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 12 19:31:50.338313 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:31:50.504922 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:31:50.507074 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:31:50.507074 ignition[829]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:31:50.507074 ignition[829]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:31:50.507074 ignition[829]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:31:50.507074 ignition[829]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:31:50.529867 ignition[829]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:31:50.567357 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:31:50.567389 kernel: audit: type=1130 audit(1707766310.530:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567400 kernel: audit: type=1130 audit(1707766310.540:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567410 kernel: audit: type=1130 audit(1707766310.543:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567909 kernel: audit: type=1131 audit(1707766310.543:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567923 kernel: audit: type=1130 audit(1707766310.562:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567933 kernel: audit: type=1131 audit(1707766310.562:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.530654 systemd[1]: Finished ignition-files.service. Feb 12 19:31:50.569237 ignition[829]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:31:50.569237 ignition[829]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:31:50.569237 ignition[829]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:31:50.569237 ignition[829]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:31:50.569237 ignition[829]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:31:50.569237 ignition[829]: INFO : files: files passed Feb 12 19:31:50.569237 ignition[829]: INFO : Ignition finished successfully Feb 12 19:31:50.532325 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:31:50.536567 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:31:50.578291 initrd-setup-root-after-ignition[853]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:31:50.582132 kernel: audit: type=1130 audit(1707766310.577:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.537331 systemd[1]: Starting ignition-quench.service... Feb 12 19:31:50.582803 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:31:50.539269 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:31:50.540921 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:31:50.541005 systemd[1]: Finished ignition-quench.service. Feb 12 19:31:50.544697 systemd[1]: Reached target ignition-complete.target. Feb 12 19:31:50.550823 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:31:50.561188 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:31:50.561258 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:31:50.562151 systemd[1]: Reached target initrd-fs.target. Feb 12 19:31:50.593532 kernel: audit: type=1131 audit(1707766310.589:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567379 systemd[1]: Reached target initrd.target. Feb 12 19:31:50.605088 kernel: audit: type=1131 audit(1707766310.594:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.605101 kernel: audit: type=1131 audit(1707766310.594:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.567946 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:31:50.568539 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:31:50.577025 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:31:50.578890 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:31:50.586827 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:31:50.587677 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:31:50.588319 systemd[1]: Stopped target timers.target. Feb 12 19:31:50.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.589515 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:31:50.589554 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:31:50.614149 iscsid[719]: iscsid shutting down. Feb 12 19:31:50.590634 systemd[1]: Stopped target initrd.target. Feb 12 19:31:50.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.593539 systemd[1]: Stopped target basic.target. Feb 12 19:31:50.594068 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:31:50.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.594346 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:31:50.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.619289 ignition[870]: INFO : Ignition 2.14.0 Feb 12 19:31:50.619289 ignition[870]: INFO : Stage: umount Feb 12 19:31:50.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.594567 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:31:50.623462 ignition[870]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:31:50.623462 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:31:50.623462 ignition[870]: INFO : umount: umount passed Feb 12 19:31:50.623462 ignition[870]: INFO : Ignition finished successfully Feb 12 19:31:50.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.594691 systemd[1]: Stopped target remote-fs.target. Feb 12 19:31:50.594794 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:31:50.594908 systemd[1]: Stopped target sysinit.target. Feb 12 19:31:50.595015 systemd[1]: Stopped target local-fs.target. Feb 12 19:31:50.595121 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:31:50.595231 systemd[1]: Stopped target swap.target. Feb 12 19:31:50.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.595344 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:31:50.595382 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:31:50.595487 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:31:50.597826 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:31:50.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.597855 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:31:50.597966 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:31:50.597992 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:31:50.600280 systemd[1]: Stopped target paths.target. Feb 12 19:31:50.600529 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:31:50.606718 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:31:50.607723 systemd[1]: Stopped target slices.target. Feb 12 19:31:50.608733 systemd[1]: Stopped target sockets.target. Feb 12 19:31:50.609812 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:31:50.609860 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:31:50.611013 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:31:50.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.611048 systemd[1]: Stopped ignition-files.service. Feb 12 19:31:50.612574 systemd[1]: Stopping ignition-mount.service... Feb 12 19:31:50.613252 systemd[1]: Stopping iscsid.service... Feb 12 19:31:50.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.614151 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:31:50.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.614199 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:31:50.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.615438 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:31:50.616319 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:31:50.616394 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:31:50.617539 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:31:50.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.617584 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:31:50.619146 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:31:50.619262 systemd[1]: Stopped iscsid.service. Feb 12 19:31:50.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.620074 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:31:50.658000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:31:50.620181 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:31:50.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.621844 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:31:50.621924 systemd[1]: Stopped ignition-mount.service. Feb 12 19:31:50.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.623691 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:31:50.623724 systemd[1]: Closed iscsid.socket. Feb 12 19:31:50.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.624676 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:31:50.624733 systemd[1]: Stopped ignition-disks.service. Feb 12 19:31:50.626019 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:31:50.626055 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:31:50.627085 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:31:50.627122 systemd[1]: Stopped ignition-setup.service. Feb 12 19:31:50.628288 systemd[1]: Stopping iscsiuio.service... Feb 12 19:31:50.630044 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:31:50.630382 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:31:50.630460 systemd[1]: Stopped iscsiuio.service. Feb 12 19:31:50.631555 systemd[1]: Stopped target network.target. Feb 12 19:31:50.632569 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:31:50.632596 systemd[1]: Closed iscsiuio.socket. Feb 12 19:31:50.633585 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:31:50.634765 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:31:50.635827 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:31:50.635891 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:31:50.636758 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:31:50.636789 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:31:50.642732 systemd-networkd[714]: eth0: DHCPv6 lease lost Feb 12 19:31:50.679000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:31:50.643650 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:31:50.643752 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:31:50.645918 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:31:50.645951 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:31:50.647561 systemd[1]: Stopping network-cleanup.service... Feb 12 19:31:50.648110 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:31:50.648152 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:31:50.649330 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:31:50.649370 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:31:50.650737 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:31:50.650768 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:31:50.652043 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:31:50.653903 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:31:50.654251 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:31:50.654328 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:31:50.656900 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:31:50.656993 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:31:50.659268 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:31:50.659302 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:31:50.659634 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:31:50.659656 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:31:50.659837 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:31:50.659864 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:31:50.660086 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:31:50.660111 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:31:50.660298 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:31:50.660324 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:31:50.660952 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:31:50.661159 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:31:50.701806 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Feb 12 19:31:50.661191 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:31:50.663599 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:31:50.663667 systemd[1]: Stopped network-cleanup.service. Feb 12 19:31:50.665593 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:31:50.665656 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:31:50.666510 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:31:50.667990 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:31:50.683704 systemd[1]: Switching root. Feb 12 19:31:50.707027 systemd-journald[197]: Journal stopped Feb 12 19:31:53.260014 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:31:53.260068 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:31:53.260085 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:31:53.260102 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:31:53.260116 kernel: SELinux: policy capability open_perms=1 Feb 12 19:31:53.260129 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:31:53.260143 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:31:53.260157 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:31:53.260173 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:31:53.260187 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:31:53.260200 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:31:53.260215 systemd[1]: Successfully loaded SELinux policy in 39.071ms. Feb 12 19:31:53.260236 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.340ms. Feb 12 19:31:53.260253 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:31:53.260268 systemd[1]: Detected virtualization kvm. Feb 12 19:31:53.260282 systemd[1]: Detected architecture x86-64. Feb 12 19:31:53.260307 systemd[1]: Detected first boot. Feb 12 19:31:53.260323 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:31:53.260338 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:31:53.260352 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:31:53.260367 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:31:53.260386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:31:53.260407 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:31:53.260423 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:31:53.260440 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:31:53.260455 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:31:53.260470 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:31:53.260485 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:31:53.260499 systemd[1]: Created slice system-getty.slice. Feb 12 19:31:53.260514 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:31:53.260529 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:31:53.260545 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:31:53.260559 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:31:53.260575 systemd[1]: Created slice user.slice. Feb 12 19:31:53.260591 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:31:53.260606 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:31:53.260620 systemd[1]: Set up automount boot.automount. Feb 12 19:31:53.260634 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:31:53.260649 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:31:53.260664 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:31:53.260924 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:31:53.260950 systemd[1]: Reached target integritysetup.target. Feb 12 19:31:53.260966 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:31:53.260980 systemd[1]: Reached target remote-fs.target. Feb 12 19:31:53.260995 systemd[1]: Reached target slices.target. Feb 12 19:31:53.261010 systemd[1]: Reached target swap.target. Feb 12 19:31:53.261025 systemd[1]: Reached target torcx.target. Feb 12 19:31:53.261040 systemd[1]: Reached target veritysetup.target. Feb 12 19:31:53.261054 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:31:53.261069 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:31:53.261087 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:31:53.261102 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:31:53.261117 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:31:53.261131 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:31:53.261145 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:31:53.261160 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:31:53.261174 systemd[1]: Mounting media.mount... Feb 12 19:31:53.261189 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:31:53.261204 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:31:53.261222 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:31:53.261237 systemd[1]: Mounting tmp.mount... Feb 12 19:31:53.261251 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:31:53.261267 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:31:53.261283 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:31:53.261308 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:31:53.261324 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:31:53.261339 systemd[1]: Starting modprobe@drm.service... Feb 12 19:31:53.261354 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:31:53.261371 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:31:53.261385 systemd[1]: Starting modprobe@loop.service... Feb 12 19:31:53.261400 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:31:53.261416 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:31:53.261430 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:31:53.261446 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:31:53.261469 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:31:53.261486 systemd[1]: Stopped systemd-journald.service. Feb 12 19:31:53.261501 systemd[1]: Starting systemd-journald.service... Feb 12 19:31:53.261516 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:31:53.261531 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:31:53.261545 kernel: fuse: init (API version 7.34) Feb 12 19:31:53.261560 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:31:53.261579 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:31:53.261597 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:31:53.261612 kernel: loop: module loaded Feb 12 19:31:53.261627 systemd[1]: Stopped verity-setup.service. Feb 12 19:31:53.261642 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:31:53.261656 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:31:53.261673 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:31:53.261701 systemd[1]: Mounted media.mount. Feb 12 19:31:53.261717 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:31:53.261732 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:31:53.261750 systemd[1]: Mounted tmp.mount. Feb 12 19:31:53.261767 systemd-journald[973]: Journal started Feb 12 19:31:53.261818 systemd-journald[973]: Runtime Journal (/run/log/journal/f91538a76be447d7a0818dc286c22485) is 6.0M, max 48.4M, 42.4M free. Feb 12 19:31:50.758000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:31:50.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:31:50.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:31:50.805000 audit: BPF prog-id=10 op=LOAD Feb 12 19:31:50.805000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:31:50.805000 audit: BPF prog-id=11 op=LOAD Feb 12 19:31:50.805000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:31:50.835000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:31:50.835000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:50.835000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:31:50.836000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:31:50.836000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b5 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:50.836000 audit: CWD cwd="/" Feb 12 19:31:50.836000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:50.836000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:50.836000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:31:53.149000 audit: BPF prog-id=12 op=LOAD Feb 12 19:31:53.149000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:31:53.149000 audit: BPF prog-id=13 op=LOAD Feb 12 19:31:53.149000 audit: BPF prog-id=14 op=LOAD Feb 12 19:31:53.149000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:31:53.149000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:31:53.150000 audit: BPF prog-id=15 op=LOAD Feb 12 19:31:53.150000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:31:53.151000 audit: BPF prog-id=16 op=LOAD Feb 12 19:31:53.151000 audit: BPF prog-id=17 op=LOAD Feb 12 19:31:53.151000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:31:53.151000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:31:53.151000 audit: BPF prog-id=18 op=LOAD Feb 12 19:31:53.151000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:31:53.151000 audit: BPF prog-id=19 op=LOAD Feb 12 19:31:53.151000 audit: BPF prog-id=20 op=LOAD Feb 12 19:31:53.151000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:31:53.262830 systemd[1]: Started systemd-journald.service. Feb 12 19:31:53.151000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:31:53.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.166000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:31:53.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.236000 audit: BPF prog-id=21 op=LOAD Feb 12 19:31:53.236000 audit: BPF prog-id=22 op=LOAD Feb 12 19:31:53.236000 audit: BPF prog-id=23 op=LOAD Feb 12 19:31:53.236000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:31:53.236000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:31:53.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.258000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:31:53.258000 audit[973]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd62812e10 a2=4000 a3=7ffd62812eac items=0 ppid=1 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:53.258000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:31:53.148695 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:31:53.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.834733 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:31:53.148704 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:31:50.834910 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:31:53.152943 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:31:50.834925 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:31:53.263757 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:31:50.834948 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:31:50.834957 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:31:50.834985 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:31:53.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.834996 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:31:50.835179 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:31:50.835211 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:31:53.264615 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:31:50.835222 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:31:53.264755 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:31:50.835479 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:31:50.835510 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:31:50.835525 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:31:50.835538 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:31:53.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:50.835551 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:31:50.835563 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:31:53.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.265709 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:31:52.874031 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:31:53.265811 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:31:52.874297 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:31:53.266600 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:31:52.874491 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:31:53.266772 systemd[1]: Finished modprobe@drm.service. Feb 12 19:31:52.875475 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:31:53.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.267551 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:31:52.875522 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:31:53.267779 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:31:52.875711 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T19:31:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:31:53.268651 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:31:53.268824 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:31:53.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.269588 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:31:53.269706 systemd[1]: Finished modprobe@loop.service. Feb 12 19:31:53.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.270504 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:31:53.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.271962 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:31:53.273167 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:31:53.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.274283 systemd[1]: Reached target network-pre.target. Feb 12 19:31:53.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.276384 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:31:53.278117 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:31:53.278773 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:31:53.282154 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:31:53.283952 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:31:53.284704 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:31:53.285894 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:31:53.286647 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:31:53.287893 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:31:53.289026 systemd-journald[973]: Time spent on flushing to /var/log/journal/f91538a76be447d7a0818dc286c22485 is 17.052ms for 1194 entries. Feb 12 19:31:53.289026 systemd-journald[973]: System Journal (/var/log/journal/f91538a76be447d7a0818dc286c22485) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:31:53.408280 systemd-journald[973]: Received client request to flush runtime journal. Feb 12 19:31:53.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.291384 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:31:53.292145 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:31:53.408997 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:31:53.292856 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:31:53.294559 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:31:53.315330 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:31:53.317799 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:31:53.320005 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:31:53.371068 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:31:53.390656 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:31:53.391492 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:31:53.409152 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:31:53.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.896991 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:31:53.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.897000 audit: BPF prog-id=24 op=LOAD Feb 12 19:31:53.897000 audit: BPF prog-id=25 op=LOAD Feb 12 19:31:53.897000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:31:53.897000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:31:53.899054 systemd[1]: Starting systemd-udevd.service... Feb 12 19:31:53.917784 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Feb 12 19:31:53.930499 systemd[1]: Started systemd-udevd.service. Feb 12 19:31:53.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.931000 audit: BPF prog-id=26 op=LOAD Feb 12 19:31:53.932603 systemd[1]: Starting systemd-networkd.service... Feb 12 19:31:53.934000 audit: BPF prog-id=27 op=LOAD Feb 12 19:31:53.934000 audit: BPF prog-id=28 op=LOAD Feb 12 19:31:53.934000 audit: BPF prog-id=29 op=LOAD Feb 12 19:31:53.936253 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:31:53.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.960783 systemd[1]: Started systemd-userdbd.service. Feb 12 19:31:53.962460 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:31:53.971934 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:31:53.995714 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 19:31:53.997145 systemd-networkd[1015]: lo: Link UP Feb 12 19:31:53.997368 systemd-networkd[1015]: lo: Gained carrier Feb 12 19:31:53.997820 systemd-networkd[1015]: Enumeration completed Feb 12 19:31:53.997970 systemd[1]: Started systemd-networkd.service. Feb 12 19:31:53.998080 systemd-networkd[1015]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:31:53.999015 systemd-networkd[1015]: eth0: Link UP Feb 12 19:31:53.999099 systemd-networkd[1015]: eth0: Gained carrier Feb 12 19:31:53.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:53.999707 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:31:54.008781 systemd-networkd[1015]: eth0: DHCPv4 address 10.0.0.23/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:31:54.006000 audit[1014]: AVC avc: denied { confidentiality } for pid=1014 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:31:54.006000 audit[1014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55818774d720 a1=32194 a2=7f240c213bc5 a3=5 items=108 ppid=1010 pid=1014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:54.006000 audit: CWD cwd="/" Feb 12 19:31:54.006000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=1 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=2 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=3 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=4 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=5 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=6 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=7 name=(null) inode=14606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=8 name=(null) inode=14606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=9 name=(null) inode=14607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=10 name=(null) inode=14606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=11 name=(null) inode=14608 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=12 name=(null) inode=14606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=13 name=(null) inode=14609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=14 name=(null) inode=14606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=15 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=16 name=(null) inode=14606 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=17 name=(null) inode=14611 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=18 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=19 name=(null) inode=14612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=20 name=(null) inode=14612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=21 name=(null) inode=14613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=22 name=(null) inode=14612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=23 name=(null) inode=14614 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=24 name=(null) inode=14612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=25 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=26 name=(null) inode=14612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=27 name=(null) inode=14616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=28 name=(null) inode=14612 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=29 name=(null) inode=14617 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=30 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=31 name=(null) inode=14618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=32 name=(null) inode=14618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=33 name=(null) inode=14619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=34 name=(null) inode=14618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=35 name=(null) inode=14620 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=36 name=(null) inode=14618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=37 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=38 name=(null) inode=14618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=39 name=(null) inode=14622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=40 name=(null) inode=14618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=41 name=(null) inode=14623 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=42 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=43 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=44 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=45 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=46 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=47 name=(null) inode=14626 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=48 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=49 name=(null) inode=14627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=50 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=51 name=(null) inode=14628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=52 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=53 name=(null) inode=14629 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=55 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=56 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=57 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=58 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=59 name=(null) inode=14632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=60 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=61 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=62 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=63 name=(null) inode=14634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=64 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=65 name=(null) inode=14635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=66 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=67 name=(null) inode=14636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=68 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=69 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=70 name=(null) inode=14633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=71 name=(null) inode=14638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=72 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=73 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=74 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=75 name=(null) inode=14640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=76 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=77 name=(null) inode=14641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=78 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=79 name=(null) inode=14642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=80 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=81 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=82 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=83 name=(null) inode=14644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=84 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=85 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=86 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=87 name=(null) inode=14646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=88 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=89 name=(null) inode=14647 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=90 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=91 name=(null) inode=14648 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=92 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=93 name=(null) inode=14649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=94 name=(null) inode=14645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=95 name=(null) inode=14650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=96 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=97 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=98 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=99 name=(null) inode=14652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=100 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=101 name=(null) inode=14653 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=102 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=103 name=(null) inode=14654 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=104 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=105 name=(null) inode=14655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=106 name=(null) inode=14651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PATH item=107 name=(null) inode=14656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:31:54.006000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:31:54.035705 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 12 19:31:54.049703 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 19:31:54.052549 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:31:54.092916 kernel: kvm: Nested Virtualization enabled Feb 12 19:31:54.092999 kernel: SVM: kvm: Nested Paging enabled Feb 12 19:31:54.093883 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 12 19:31:54.093935 kernel: SVM: Virtual GIF supported Feb 12 19:31:54.111711 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:31:54.128025 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:31:54.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.129750 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:31:54.136281 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:31:54.163663 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:31:54.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.164510 systemd[1]: Reached target cryptsetup.target. Feb 12 19:31:54.166106 systemd[1]: Starting lvm2-activation.service... Feb 12 19:31:54.169412 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:31:54.193382 systemd[1]: Finished lvm2-activation.service. Feb 12 19:31:54.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.194084 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:31:54.194709 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:31:54.194732 systemd[1]: Reached target local-fs.target. Feb 12 19:31:54.195290 systemd[1]: Reached target machines.target. Feb 12 19:31:54.196753 systemd[1]: Starting ldconfig.service... Feb 12 19:31:54.197526 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:31:54.197570 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:31:54.198351 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:31:54.199722 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:31:54.201424 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:31:54.202709 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:31:54.202738 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:31:54.203810 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:31:54.204728 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Feb 12 19:31:54.205632 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:31:54.211237 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:31:54.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.218132 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:31:54.219519 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:31:54.221823 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:31:54.245062 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Feb 12 19:31:54.245062 systemd-fsck[1058]: /dev/vda1: 790 files, 115362/258078 clusters Feb 12 19:31:54.246841 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:31:54.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.249256 systemd[1]: Mounting boot.mount... Feb 12 19:31:54.306825 systemd[1]: Mounted boot.mount. Feb 12 19:31:54.319805 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:31:54.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.319789 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:31:54.775453 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:31:54.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.777654 systemd[1]: Starting audit-rules.service... Feb 12 19:31:54.779542 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:31:54.781312 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:31:54.782000 audit: BPF prog-id=30 op=LOAD Feb 12 19:31:54.783455 systemd[1]: Starting systemd-resolved.service... Feb 12 19:31:54.784000 audit: BPF prog-id=31 op=LOAD Feb 12 19:31:54.785850 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:31:54.787524 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:31:54.830000 audit[1067]: SYSTEM_BOOT pid=1067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.833200 systemd-resolved[1065]: Positive Trust Anchors: Feb 12 19:31:54.833212 systemd-resolved[1065]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:31:54.833236 systemd-resolved[1065]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:31:54.834438 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:31:54.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.836062 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:31:54.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.183466 systemd-journald[973]: Time jumped backwards, rotating. Feb 12 19:31:54.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:54.174000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:31:54.174000 audit[1084]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2643b7a0 a2=420 a3=0 items=0 ppid=1061 pid=1084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:54.174000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:31:54.837494 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:31:54.183939 augenrules[1084]: No rules Feb 12 19:31:54.131814 systemd-timesyncd[1066]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:31:54.131847 systemd-timesyncd[1066]: Initial clock synchronization to Mon 2024-02-12 19:31:54.131758 UTC. Feb 12 19:31:54.132743 systemd[1]: Reached target time-set.target. Feb 12 19:31:54.133463 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:31:54.140694 systemd[1]: Finished ldconfig.service. Feb 12 19:31:54.145064 systemd-resolved[1065]: Defaulting to hostname 'linux'. Feb 12 19:31:54.146521 systemd[1]: Started systemd-resolved.service. Feb 12 19:31:54.147255 systemd[1]: Reached target network.target. Feb 12 19:31:54.147817 systemd[1]: Reached target nss-lookup.target. Feb 12 19:31:54.169802 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:31:54.172019 systemd[1]: Starting systemd-update-done.service... Feb 12 19:31:54.177030 systemd[1]: Finished audit-rules.service. Feb 12 19:31:54.177879 systemd[1]: Finished systemd-update-done.service. Feb 12 19:31:54.178792 systemd[1]: Reached target sysinit.target. Feb 12 19:31:54.179639 systemd[1]: Started motdgen.path. Feb 12 19:31:54.180254 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:31:54.181397 systemd[1]: Started logrotate.timer. Feb 12 19:31:54.182104 systemd[1]: Started mdadm.timer. Feb 12 19:31:54.182696 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:31:54.183405 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:31:54.183435 systemd[1]: Reached target paths.target. Feb 12 19:31:54.184057 systemd[1]: Reached target timers.target. Feb 12 19:31:54.184995 systemd[1]: Listening on dbus.socket. Feb 12 19:31:54.186589 systemd[1]: Starting docker.socket... Feb 12 19:31:54.188664 systemd[1]: Listening on sshd.socket. Feb 12 19:31:54.189393 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:31:54.190423 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:31:54.190884 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:31:54.191808 systemd[1]: Listening on docker.socket. Feb 12 19:31:54.192493 systemd[1]: Reached target sockets.target. Feb 12 19:31:54.193146 systemd[1]: Reached target basic.target. Feb 12 19:31:54.193818 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:31:54.193840 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:31:54.194498 systemd[1]: Starting containerd.service... Feb 12 19:31:54.195774 systemd[1]: Starting dbus.service... Feb 12 19:31:54.197038 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:31:54.198563 systemd[1]: Starting extend-filesystems.service... Feb 12 19:31:54.199236 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:31:54.199960 systemd[1]: Starting motdgen.service... Feb 12 19:31:54.202696 jq[1093]: false Feb 12 19:31:54.201156 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:31:54.202688 systemd[1]: Starting prepare-critools.service... Feb 12 19:31:54.204140 systemd[1]: Starting prepare-helm.service... Feb 12 19:31:54.205547 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:31:54.207310 systemd[1]: Starting sshd-keygen.service... Feb 12 19:31:54.229266 dbus-daemon[1092]: [system] SELinux support is enabled Feb 12 19:31:54.306347 systemd[1]: Starting systemd-logind.service... Feb 12 19:31:54.307117 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:31:54.307172 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:31:54.307708 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:31:54.308349 systemd[1]: Starting update-engine.service... Feb 12 19:31:54.310017 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:31:54.311892 systemd[1]: Started dbus.service. Feb 12 19:31:54.315344 jq[1114]: true Feb 12 19:31:54.316272 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:31:54.317120 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:31:54.317429 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:31:54.317608 systemd[1]: Finished motdgen.service. Feb 12 19:31:54.320630 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:31:54.321969 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:31:54.324018 tar[1116]: ./ Feb 12 19:31:54.324018 tar[1116]: ./loopback Feb 12 19:31:54.324782 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:31:54.324809 systemd[1]: Reached target system-config.target. Feb 12 19:31:54.326769 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:31:54.326791 systemd[1]: Reached target user-config.target. Feb 12 19:31:54.331197 jq[1122]: true Feb 12 19:31:54.337146 tar[1117]: crictl Feb 12 19:31:54.337384 tar[1118]: linux-amd64/helm Feb 12 19:31:54.341708 extend-filesystems[1094]: Found sr0 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda1 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda2 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda3 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found usr Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda4 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda6 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda7 Feb 12 19:31:54.341708 extend-filesystems[1094]: Found vda9 Feb 12 19:31:54.341708 extend-filesystems[1094]: Checking size of /dev/vda9 Feb 12 19:31:54.362506 extend-filesystems[1094]: Resized partition /dev/vda9 Feb 12 19:31:54.366317 extend-filesystems[1147]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:31:54.374691 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:31:54.377889 update_engine[1113]: I0212 19:31:54.377684 1113 main.cc:92] Flatcar Update Engine starting Feb 12 19:31:54.379403 update_engine[1113]: I0212 19:31:54.379317 1113 update_check_scheduler.cc:74] Next update check in 2m48s Feb 12 19:31:54.379325 systemd[1]: Started update-engine.service. Feb 12 19:31:54.383101 systemd[1]: Started locksmithd.service. Feb 12 19:31:54.390689 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:31:54.407832 env[1123]: time="2024-02-12T19:31:54.407792139Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:31:54.408167 extend-filesystems[1147]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:31:54.408167 extend-filesystems[1147]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:31:54.408167 extend-filesystems[1147]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:31:54.411169 extend-filesystems[1094]: Resized filesystem in /dev/vda9 Feb 12 19:31:54.413017 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:31:54.413139 systemd[1]: Finished extend-filesystems.service. Feb 12 19:31:54.413570 systemd-logind[1112]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:31:54.413586 systemd-logind[1112]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:31:54.414988 systemd-logind[1112]: New seat seat0. Feb 12 19:31:54.415406 bash[1151]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:31:54.415588 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:31:54.427796 env[1123]: time="2024-02-12T19:31:54.427768334Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:31:54.428011 env[1123]: time="2024-02-12T19:31:54.427994328Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429020 env[1123]: time="2024-02-12T19:31:54.428998450Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429093 env[1123]: time="2024-02-12T19:31:54.429075976Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429324 env[1123]: time="2024-02-12T19:31:54.429305035Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429410 env[1123]: time="2024-02-12T19:31:54.429393631Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429483 env[1123]: time="2024-02-12T19:31:54.429463953Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:31:54.429569 env[1123]: time="2024-02-12T19:31:54.429550846Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429717 env[1123]: time="2024-02-12T19:31:54.429700998Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:31:54.429973 env[1123]: time="2024-02-12T19:31:54.429956617Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:31:54.430135 env[1123]: time="2024-02-12T19:31:54.430116437Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:31:54.430206 env[1123]: time="2024-02-12T19:31:54.430188893Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:31:54.430322 env[1123]: time="2024-02-12T19:31:54.430304309Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:31:54.430398 env[1123]: time="2024-02-12T19:31:54.430378819Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:31:54.432022 systemd[1]: Started systemd-logind.service. Feb 12 19:31:54.435055 env[1123]: time="2024-02-12T19:31:54.434951803Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435120309Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435141218Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435166866Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435178759Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435190030Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435200489Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435212462Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435223733Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435245133Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435256885Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435266573Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435339500Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435394874Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:31:54.436688 env[1123]: time="2024-02-12T19:31:54.435588186Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435614145Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435625296Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435662205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435685419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435696038Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435706047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435715956Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435725594Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435736043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435745201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435756582Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435848314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435860176Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435870766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.436990 env[1123]: time="2024-02-12T19:31:54.435880064Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:31:54.437245 env[1123]: time="2024-02-12T19:31:54.435892306Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:31:54.437245 env[1123]: time="2024-02-12T19:31:54.435901183Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:31:54.437245 env[1123]: time="2024-02-12T19:31:54.435918856Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:31:54.437245 env[1123]: time="2024-02-12T19:31:54.435949283Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:31:54.437321 env[1123]: time="2024-02-12T19:31:54.436116878Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:31:54.437321 env[1123]: time="2024-02-12T19:31:54.436171460Z" level=info msg="Connect containerd service" Feb 12 19:31:54.437321 env[1123]: time="2024-02-12T19:31:54.436198210Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:31:54.437321 env[1123]: time="2024-02-12T19:31:54.436630691Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.437591512Z" level=info msg="Start subscribing containerd event" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.437633682Z" level=info msg="Start recovering state" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.437692842Z" level=info msg="Start event monitor" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.437703843Z" level=info msg="Start snapshots syncer" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.437711017Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.437717409Z" level=info msg="Start streaming server" Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.438077363Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:31:54.439368 env[1123]: time="2024-02-12T19:31:54.438114944Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:31:54.438195 systemd[1]: Started containerd.service. Feb 12 19:31:54.440600 env[1123]: time="2024-02-12T19:31:54.440582240Z" level=info msg="containerd successfully booted in 0.034283s" Feb 12 19:31:54.444790 tar[1116]: ./bandwidth Feb 12 19:31:54.475761 tar[1116]: ./ptp Feb 12 19:31:54.509466 tar[1116]: ./vlan Feb 12 19:31:54.559564 tar[1116]: ./host-device Feb 12 19:31:54.616699 tar[1116]: ./tuning Feb 12 19:31:54.647646 tar[1116]: ./vrf Feb 12 19:31:54.710107 tar[1116]: ./sbr Feb 12 19:31:54.741069 tar[1116]: ./tap Feb 12 19:31:54.780129 tar[1116]: ./dhcp Feb 12 19:31:54.859875 tar[1118]: linux-amd64/LICENSE Feb 12 19:31:54.860157 tar[1118]: linux-amd64/README.md Feb 12 19:31:54.865286 systemd[1]: Finished prepare-helm.service. Feb 12 19:31:54.871121 locksmithd[1149]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:31:54.874717 tar[1116]: ./static Feb 12 19:31:54.899173 tar[1116]: ./firewall Feb 12 19:31:54.913095 systemd[1]: Finished prepare-critools.service. Feb 12 19:31:54.933094 tar[1116]: ./macvlan Feb 12 19:31:54.962309 tar[1116]: ./dummy Feb 12 19:31:54.962792 systemd-networkd[1015]: eth0: Gained IPv6LL Feb 12 19:31:54.991075 tar[1116]: ./bridge Feb 12 19:31:55.022551 tar[1116]: ./ipvlan Feb 12 19:31:55.051636 tar[1116]: ./portmap Feb 12 19:31:55.079765 tar[1116]: ./host-local Feb 12 19:31:55.121876 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:31:55.527602 sshd_keygen[1107]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:31:55.543121 systemd[1]: Finished sshd-keygen.service. Feb 12 19:31:55.545015 systemd[1]: Starting issuegen.service... Feb 12 19:31:55.548868 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:31:55.549008 systemd[1]: Finished issuegen.service. Feb 12 19:31:55.550599 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:31:55.554796 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:31:55.556474 systemd[1]: Started getty@tty1.service. Feb 12 19:31:55.557998 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:31:55.558866 systemd[1]: Reached target getty.target. Feb 12 19:31:55.559505 systemd[1]: Reached target multi-user.target. Feb 12 19:31:55.561046 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:31:55.567403 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:31:55.567517 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:31:55.568335 systemd[1]: Startup finished in 526ms (kernel) + 27.034s (initrd) + 5.555s (userspace) = 33.117s. Feb 12 19:31:58.417989 systemd[1]: Created slice system-sshd.slice. Feb 12 19:31:58.419136 systemd[1]: Started sshd@0-10.0.0.23:22-10.0.0.1:39042.service. Feb 12 19:31:58.453347 sshd[1183]: Accepted publickey for core from 10.0.0.1 port 39042 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:58.454526 sshd[1183]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.462014 systemd-logind[1112]: New session 1 of user core. Feb 12 19:31:58.462835 systemd[1]: Created slice user-500.slice. Feb 12 19:31:58.463738 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:31:58.470286 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:31:58.471312 systemd[1]: Starting user@500.service... Feb 12 19:31:58.473418 (systemd)[1186]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.533880 systemd[1186]: Queued start job for default target default.target. Feb 12 19:31:58.534268 systemd[1186]: Reached target paths.target. Feb 12 19:31:58.534288 systemd[1186]: Reached target sockets.target. Feb 12 19:31:58.534300 systemd[1186]: Reached target timers.target. Feb 12 19:31:58.534310 systemd[1186]: Reached target basic.target. Feb 12 19:31:58.534343 systemd[1186]: Reached target default.target. Feb 12 19:31:58.534364 systemd[1186]: Startup finished in 56ms. Feb 12 19:31:58.534442 systemd[1]: Started user@500.service. Feb 12 19:31:58.535359 systemd[1]: Started session-1.scope. Feb 12 19:31:58.585376 systemd[1]: Started sshd@1-10.0.0.23:22-10.0.0.1:39052.service. Feb 12 19:31:58.619247 sshd[1195]: Accepted publickey for core from 10.0.0.1 port 39052 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:58.620345 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.623809 systemd-logind[1112]: New session 2 of user core. Feb 12 19:31:58.624498 systemd[1]: Started session-2.scope. Feb 12 19:31:58.678163 sshd[1195]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:58.680727 systemd[1]: sshd@1-10.0.0.23:22-10.0.0.1:39052.service: Deactivated successfully. Feb 12 19:31:58.681257 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:31:58.681663 systemd-logind[1112]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:31:58.682785 systemd[1]: Started sshd@2-10.0.0.23:22-10.0.0.1:39062.service. Feb 12 19:31:58.683591 systemd-logind[1112]: Removed session 2. Feb 12 19:31:58.713829 sshd[1201]: Accepted publickey for core from 10.0.0.1 port 39062 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:58.716775 sshd[1201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.719599 systemd-logind[1112]: New session 3 of user core. Feb 12 19:31:58.720316 systemd[1]: Started session-3.scope. Feb 12 19:31:58.767481 sshd[1201]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:58.770098 systemd[1]: sshd@2-10.0.0.23:22-10.0.0.1:39062.service: Deactivated successfully. Feb 12 19:31:58.770583 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:31:58.771039 systemd-logind[1112]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:31:58.771957 systemd[1]: Started sshd@3-10.0.0.23:22-10.0.0.1:39074.service. Feb 12 19:31:58.772475 systemd-logind[1112]: Removed session 3. Feb 12 19:31:58.802277 sshd[1207]: Accepted publickey for core from 10.0.0.1 port 39074 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:58.802997 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.805597 systemd-logind[1112]: New session 4 of user core. Feb 12 19:31:58.806284 systemd[1]: Started session-4.scope. Feb 12 19:31:58.856877 sshd[1207]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:58.859008 systemd[1]: sshd@3-10.0.0.23:22-10.0.0.1:39074.service: Deactivated successfully. Feb 12 19:31:58.859472 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:31:58.859874 systemd-logind[1112]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:31:58.860598 systemd[1]: Started sshd@4-10.0.0.23:22-10.0.0.1:39082.service. Feb 12 19:31:58.861226 systemd-logind[1112]: Removed session 4. Feb 12 19:31:58.891231 sshd[1213]: Accepted publickey for core from 10.0.0.1 port 39082 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:58.892027 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.894771 systemd-logind[1112]: New session 5 of user core. Feb 12 19:31:58.895443 systemd[1]: Started session-5.scope. Feb 12 19:31:58.947852 sudo[1216]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:31:58.948002 sudo[1216]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:31:58.956848 dbus-daemon[1092]: \xd0- U\u0004V: received setenforce notice (enforcing=-596750208) Feb 12 19:31:58.958842 sudo[1216]: pam_unix(sudo:session): session closed for user root Feb 12 19:31:58.960375 sshd[1213]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:58.962677 systemd[1]: sshd@4-10.0.0.23:22-10.0.0.1:39082.service: Deactivated successfully. Feb 12 19:31:58.963137 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:31:58.963565 systemd-logind[1112]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:31:58.964417 systemd[1]: Started sshd@5-10.0.0.23:22-10.0.0.1:39094.service. Feb 12 19:31:58.964964 systemd-logind[1112]: Removed session 5. Feb 12 19:31:58.995163 sshd[1220]: Accepted publickey for core from 10.0.0.1 port 39094 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:58.996206 sshd[1220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:58.999230 systemd-logind[1112]: New session 6 of user core. Feb 12 19:31:58.999958 systemd[1]: Started session-6.scope. Feb 12 19:31:59.050746 sudo[1224]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:31:59.050907 sudo[1224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:31:59.052945 sudo[1224]: pam_unix(sudo:session): session closed for user root Feb 12 19:31:59.056829 sudo[1223]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:31:59.056979 sudo[1223]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:31:59.064148 systemd[1]: Stopping audit-rules.service... Feb 12 19:31:59.063000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:31:59.065189 auditctl[1227]: No rules Feb 12 19:31:59.065518 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:31:59.065685 systemd[1]: Stopped audit-rules.service. Feb 12 19:31:59.069321 kernel: kauditd_printk_skb: 248 callbacks suppressed Feb 12 19:31:59.069358 kernel: audit: type=1305 audit(1707766319.063:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:31:59.069372 kernel: audit: type=1300 audit(1707766319.063:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe32dc9ee0 a2=420 a3=0 items=0 ppid=1 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:59.063000 audit[1227]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe32dc9ee0 a2=420 a3=0 items=0 ppid=1 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:59.066960 systemd[1]: Starting audit-rules.service... Feb 12 19:31:59.063000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:31:59.072852 kernel: audit: type=1327 audit(1707766319.063:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:31:59.072916 kernel: audit: type=1131 audit(1707766319.064:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.079906 augenrules[1244]: No rules Feb 12 19:31:59.080492 systemd[1]: Finished audit-rules.service. Feb 12 19:31:59.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.081102 sudo[1223]: pam_unix(sudo:session): session closed for user root Feb 12 19:31:59.082117 sshd[1220]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:59.086732 kernel: audit: type=1130 audit(1707766319.079:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.086785 kernel: audit: type=1106 audit(1707766319.079:173): pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.086800 kernel: audit: type=1104 audit(1707766319.079:174): pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.079000 audit[1223]: USER_END pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.079000 audit[1223]: CRED_DISP pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.084530 systemd[1]: sshd@5-10.0.0.23:22-10.0.0.1:39094.service: Deactivated successfully. Feb 12 19:31:59.084970 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:31:59.086031 systemd[1]: Started sshd@6-10.0.0.23:22-10.0.0.1:39108.service. Feb 12 19:31:59.087185 systemd-logind[1112]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:31:59.081000 audit[1220]: USER_END pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.087943 systemd-logind[1112]: Removed session 6. Feb 12 19:31:59.090679 kernel: audit: type=1106 audit(1707766319.081:175): pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.090711 kernel: audit: type=1104 audit(1707766319.081:176): pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.081000 audit[1220]: CRED_DISP pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.23:22-10.0.0.1:39094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.095268 kernel: audit: type=1131 audit(1707766319.083:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.23:22-10.0.0.1:39094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.23:22-10.0.0.1:39108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.117000 audit[1250]: USER_ACCT pid=1250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.119394 sshd[1250]: Accepted publickey for core from 10.0.0.1 port 39108 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:31:59.118000 audit[1250]: CRED_ACQ pid=1250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.118000 audit[1250]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc654fbc70 a2=3 a3=0 items=0 ppid=1 pid=1250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:59.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:59.120284 sshd[1250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:59.122890 systemd-logind[1112]: New session 7 of user core. Feb 12 19:31:59.123499 systemd[1]: Started session-7.scope. Feb 12 19:31:59.124000 audit[1250]: USER_START pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.125000 audit[1252]: CRED_ACQ pid=1252 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:59.171000 audit[1253]: USER_ACCT pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.171000 audit[1253]: CRED_REFR pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.173138 sudo[1253]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:31:59.173295 sudo[1253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:31:59.172000 audit[1253]: USER_START pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.983396 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:31:59.987544 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:31:59.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:59.987788 systemd[1]: Reached target network-online.target. Feb 12 19:31:59.988624 systemd[1]: Starting docker.service... Feb 12 19:32:00.020075 env[1271]: time="2024-02-12T19:32:00.020023080Z" level=info msg="Starting up" Feb 12 19:32:00.021444 env[1271]: time="2024-02-12T19:32:00.021406644Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:32:00.021444 env[1271]: time="2024-02-12T19:32:00.021431721Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:32:00.021512 env[1271]: time="2024-02-12T19:32:00.021453713Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:32:00.021512 env[1271]: time="2024-02-12T19:32:00.021463982Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:32:00.022994 env[1271]: time="2024-02-12T19:32:00.022967110Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:32:00.022994 env[1271]: time="2024-02-12T19:32:00.022989292Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:32:00.023053 env[1271]: time="2024-02-12T19:32:00.023001565Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:32:00.023053 env[1271]: time="2024-02-12T19:32:00.023009880Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:32:00.303387 env[1271]: time="2024-02-12T19:32:00.303288954Z" level=info msg="Loading containers: start." Feb 12 19:32:00.336000 audit[1305]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.336000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd2dec6a70 a2=0 a3=7ffd2dec6a5c items=0 ppid=1271 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:32:00.338000 audit[1307]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.338000 audit[1307]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb10b2cc0 a2=0 a3=7ffeb10b2cac items=0 ppid=1271 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:32:00.339000 audit[1309]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.339000 audit[1309]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff34e6e7e0 a2=0 a3=7fff34e6e7cc items=0 ppid=1271 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:32:00.341000 audit[1311]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.341000 audit[1311]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc62f30640 a2=0 a3=7ffc62f3062c items=0 ppid=1271 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:32:00.342000 audit[1313]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.342000 audit[1313]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffffcc7d010 a2=0 a3=7ffffcc7cffc items=0 ppid=1271 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:32:00.364000 audit[1318]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.364000 audit[1318]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe92c35480 a2=0 a3=7ffe92c3546c items=0 ppid=1271 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:32:00.371000 audit[1320]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.371000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd9a82bde0 a2=0 a3=7ffd9a82bdcc items=0 ppid=1271 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.371000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:32:00.372000 audit[1322]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.372000 audit[1322]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdef1956b0 a2=0 a3=7ffdef19569c items=0 ppid=1271 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.372000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:32:00.373000 audit[1324]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.373000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc125bc3d0 a2=0 a3=7ffc125bc3bc items=0 ppid=1271 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:32:00.380000 audit[1328]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.380000 audit[1328]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff12af0510 a2=0 a3=7fff12af04fc items=0 ppid=1271 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.380000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:32:00.381000 audit[1329]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.381000 audit[1329]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc60406200 a2=0 a3=7ffc604061ec items=0 ppid=1271 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:32:00.388696 kernel: Initializing XFRM netlink socket Feb 12 19:32:00.413658 env[1271]: time="2024-02-12T19:32:00.413632448Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:32:00.425000 audit[1337]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.425000 audit[1337]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc74c24120 a2=0 a3=7ffc74c2410c items=0 ppid=1271 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:32:00.435000 audit[1340]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.435000 audit[1340]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe84b54c70 a2=0 a3=7ffe84b54c5c items=0 ppid=1271 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.435000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:32:00.437000 audit[1343]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.437000 audit[1343]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeb7ebc290 a2=0 a3=7ffeb7ebc27c items=0 ppid=1271 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.437000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:32:00.438000 audit[1345]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.438000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff76ae0ff0 a2=0 a3=7fff76ae0fdc items=0 ppid=1271 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:32:00.440000 audit[1347]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.440000 audit[1347]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffee3379700 a2=0 a3=7ffee33796ec items=0 ppid=1271 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:32:00.442000 audit[1349]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.442000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffff556b00 a2=0 a3=7fffff556aec items=0 ppid=1271 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:32:00.443000 audit[1351]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.443000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd41379b80 a2=0 a3=7ffd41379b6c items=0 ppid=1271 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.443000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:32:00.449000 audit[1354]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.449000 audit[1354]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc763bcea0 a2=0 a3=7ffc763bce8c items=0 ppid=1271 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:32:00.450000 audit[1356]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.450000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc4c567c40 a2=0 a3=7ffc4c567c2c items=0 ppid=1271 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:32:00.452000 audit[1358]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.452000 audit[1358]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe611bf9e0 a2=0 a3=7ffe611bf9cc items=0 ppid=1271 pid=1358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.452000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:32:00.453000 audit[1360]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.453000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdec986a40 a2=0 a3=7ffdec986a2c items=0 ppid=1271 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.453000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:32:00.455792 systemd-networkd[1015]: docker0: Link UP Feb 12 19:32:00.460000 audit[1364]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.460000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2b11a700 a2=0 a3=7fff2b11a6ec items=0 ppid=1271 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.460000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:32:00.461000 audit[1365]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:00.461000 audit[1365]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff935d0350 a2=0 a3=7fff935d033c items=0 ppid=1271 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:00.461000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:32:00.463386 env[1271]: time="2024-02-12T19:32:00.463356390Z" level=info msg="Loading containers: done." Feb 12 19:32:00.471180 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck353417368-merged.mount: Deactivated successfully. Feb 12 19:32:00.475746 env[1271]: time="2024-02-12T19:32:00.475709542Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:32:00.475866 env[1271]: time="2024-02-12T19:32:00.475842672Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:32:00.475943 env[1271]: time="2024-02-12T19:32:00.475925808Z" level=info msg="Daemon has completed initialization" Feb 12 19:32:00.489439 systemd[1]: Started docker.service. Feb 12 19:32:00.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:00.497051 env[1271]: time="2024-02-12T19:32:00.497009500Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:32:00.511606 systemd[1]: Reloading. Feb 12 19:32:00.566719 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2024-02-12T19:32:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:32:00.566746 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2024-02-12T19:32:00Z" level=info msg="torcx already run" Feb 12 19:32:00.628109 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:32:00.628125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:32:00.644766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit: BPF prog-id=37 op=LOAD Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.698000 audit: BPF prog-id=38 op=LOAD Feb 12 19:32:00.698000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:32:00.698000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.700000 audit: BPF prog-id=39 op=LOAD Feb 12 19:32:00.700000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit: BPF prog-id=40 op=LOAD Feb 12 19:32:00.702000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit: BPF prog-id=41 op=LOAD Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.702000 audit: BPF prog-id=42 op=LOAD Feb 12 19:32:00.702000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:32:00.702000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit: BPF prog-id=43 op=LOAD Feb 12 19:32:00.703000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit: BPF prog-id=44 op=LOAD Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.703000 audit: BPF prog-id=45 op=LOAD Feb 12 19:32:00.703000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:32:00.704000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit: BPF prog-id=46 op=LOAD Feb 12 19:32:00.704000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.704000 audit: BPF prog-id=47 op=LOAD Feb 12 19:32:00.704000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit: BPF prog-id=48 op=LOAD Feb 12 19:32:00.706000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit: BPF prog-id=49 op=LOAD Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit: BPF prog-id=50 op=LOAD Feb 12 19:32:00.706000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:32:00.706000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:00.706000 audit: BPF prog-id=51 op=LOAD Feb 12 19:32:00.706000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:32:00.713886 systemd[1]: Started kubelet.service. Feb 12 19:32:00.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:00.756374 kubelet[1453]: E0212 19:32:00.756317 1453 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:32:00.758463 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:32:00.758576 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:32:00.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:32:01.537136 env[1123]: time="2024-02-12T19:32:01.537088057Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 19:32:02.160808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1250778611.mount: Deactivated successfully. Feb 12 19:32:04.537212 env[1123]: time="2024-02-12T19:32:04.537161453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:04.538834 env[1123]: time="2024-02-12T19:32:04.538806478Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:04.540493 env[1123]: time="2024-02-12T19:32:04.540457594Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:04.541873 env[1123]: time="2024-02-12T19:32:04.541848582Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:04.542498 env[1123]: time="2024-02-12T19:32:04.542465288Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 12 19:32:04.550851 env[1123]: time="2024-02-12T19:32:04.550816697Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 19:32:07.146326 env[1123]: time="2024-02-12T19:32:07.146270332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:07.148083 env[1123]: time="2024-02-12T19:32:07.148029621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:07.149486 env[1123]: time="2024-02-12T19:32:07.149460433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:07.151327 env[1123]: time="2024-02-12T19:32:07.151300443Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:07.152137 env[1123]: time="2024-02-12T19:32:07.152102988Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 12 19:32:07.160646 env[1123]: time="2024-02-12T19:32:07.160608516Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 19:32:09.265046 env[1123]: time="2024-02-12T19:32:09.264982336Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:09.267606 env[1123]: time="2024-02-12T19:32:09.267574366Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:09.269278 env[1123]: time="2024-02-12T19:32:09.269231253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:09.270696 env[1123]: time="2024-02-12T19:32:09.270654361Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:09.271301 env[1123]: time="2024-02-12T19:32:09.271270887Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 12 19:32:09.281420 env[1123]: time="2024-02-12T19:32:09.281382306Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:32:10.462300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2443834519.mount: Deactivated successfully. Feb 12 19:32:10.933663 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:32:10.933927 systemd[1]: Stopped kubelet.service. Feb 12 19:32:10.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:10.936125 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 19:32:10.936162 kernel: audit: type=1130 audit(1707766330.932:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:10.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:10.941415 kernel: audit: type=1131 audit(1707766330.932:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:10.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:10.941709 systemd[1]: Started kubelet.service. Feb 12 19:32:10.945695 kernel: audit: type=1130 audit(1707766330.938:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:11.033388 kubelet[1495]: E0212 19:32:11.033326 1495 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:32:11.037544 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:32:11.037700 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:32:11.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:32:11.041697 kernel: audit: type=1131 audit(1707766331.036:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:32:11.341663 env[1123]: time="2024-02-12T19:32:11.341496800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:11.343843 env[1123]: time="2024-02-12T19:32:11.343797354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:11.345596 env[1123]: time="2024-02-12T19:32:11.345540082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:11.347136 env[1123]: time="2024-02-12T19:32:11.347098213Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:11.347497 env[1123]: time="2024-02-12T19:32:11.347461544Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 19:32:11.358458 env[1123]: time="2024-02-12T19:32:11.358427025Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:32:12.633373 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3565878557.mount: Deactivated successfully. Feb 12 19:32:12.772781 env[1123]: time="2024-02-12T19:32:12.772707540Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:12.802579 env[1123]: time="2024-02-12T19:32:12.802523375Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:12.811878 env[1123]: time="2024-02-12T19:32:12.811843139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:12.821635 env[1123]: time="2024-02-12T19:32:12.821599232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:12.822015 env[1123]: time="2024-02-12T19:32:12.821984865Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 19:32:12.834980 env[1123]: time="2024-02-12T19:32:12.834935057Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 19:32:14.350789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3795803067.mount: Deactivated successfully. Feb 12 19:32:20.046957 env[1123]: time="2024-02-12T19:32:20.046898446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:20.048733 env[1123]: time="2024-02-12T19:32:20.048710714Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:20.050387 env[1123]: time="2024-02-12T19:32:20.050364976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:20.051817 env[1123]: time="2024-02-12T19:32:20.051772355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:20.052412 env[1123]: time="2024-02-12T19:32:20.052378020Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 12 19:32:20.063907 env[1123]: time="2024-02-12T19:32:20.063867904Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:32:20.724595 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1500044353.mount: Deactivated successfully. Feb 12 19:32:21.183654 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:32:21.183922 systemd[1]: Stopped kubelet.service. Feb 12 19:32:21.190165 kernel: audit: type=1130 audit(1707766341.182:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:21.190216 kernel: audit: type=1131 audit(1707766341.182:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:21.190232 kernel: audit: type=1130 audit(1707766341.184:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:21.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:21.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:21.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:21.185602 systemd[1]: Started kubelet.service. Feb 12 19:32:21.241467 kubelet[1521]: E0212 19:32:21.241423 1521 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:32:21.248720 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:32:21.248845 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:32:21.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:32:21.251687 kernel: audit: type=1131 audit(1707766341.247:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:32:21.522721 env[1123]: time="2024-02-12T19:32:21.522583956Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:21.524636 env[1123]: time="2024-02-12T19:32:21.524581982Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:21.526067 env[1123]: time="2024-02-12T19:32:21.526015781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:21.527281 env[1123]: time="2024-02-12T19:32:21.527249955Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:21.527884 env[1123]: time="2024-02-12T19:32:21.527849569Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 19:32:23.827884 systemd[1]: Stopped kubelet.service. Feb 12 19:32:23.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:23.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:23.832561 kernel: audit: type=1130 audit(1707766343.826:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:23.832603 kernel: audit: type=1131 audit(1707766343.826:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:23.840097 systemd[1]: Reloading. Feb 12 19:32:23.895634 /usr/lib/systemd/system-generators/torcx-generator[1629]: time="2024-02-12T19:32:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:32:23.895661 /usr/lib/systemd/system-generators/torcx-generator[1629]: time="2024-02-12T19:32:23Z" level=info msg="torcx already run" Feb 12 19:32:23.950431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:32:23.950451 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:32:23.966817 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.025272 kernel: audit: type=1400 audit(1707766344.019:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.025312 kernel: audit: type=1400 audit(1707766344.019:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.025338 kernel: audit: type=1400 audit(1707766344.019:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027243 kernel: audit: type=1400 audit(1707766344.019:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit: BPF prog-id=52 op=LOAD Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.025000 audit: BPF prog-id=53 op=LOAD Feb 12 19:32:24.025000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:32:24.025000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:32:24.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.027000 audit: BPF prog-id=54 op=LOAD Feb 12 19:32:24.027000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit: BPF prog-id=55 op=LOAD Feb 12 19:32:24.029000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit: BPF prog-id=56 op=LOAD Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.029000 audit: BPF prog-id=57 op=LOAD Feb 12 19:32:24.029000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:32:24.029000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.030000 audit: BPF prog-id=58 op=LOAD Feb 12 19:32:24.031000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit: BPF prog-id=59 op=LOAD Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit: BPF prog-id=60 op=LOAD Feb 12 19:32:24.031000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:32:24.031000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit: BPF prog-id=61 op=LOAD Feb 12 19:32:24.031000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.032000 audit: BPF prog-id=62 op=LOAD Feb 12 19:32:24.032000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit: BPF prog-id=63 op=LOAD Feb 12 19:32:24.033000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit: BPF prog-id=64 op=LOAD Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit: BPF prog-id=65 op=LOAD Feb 12 19:32:24.033000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:32:24.033000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.033000 audit: BPF prog-id=66 op=LOAD Feb 12 19:32:24.033000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:32:24.044194 systemd[1]: Started kubelet.service. Feb 12 19:32:24.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:24.083955 kubelet[1668]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:32:24.083955 kubelet[1668]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:32:24.083955 kubelet[1668]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:32:24.083955 kubelet[1668]: I0212 19:32:24.083939 1668 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:32:24.701591 kubelet[1668]: I0212 19:32:24.701552 1668 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:32:24.701591 kubelet[1668]: I0212 19:32:24.701582 1668 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:32:24.701815 kubelet[1668]: I0212 19:32:24.701797 1668 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:32:24.704912 kubelet[1668]: I0212 19:32:24.704887 1668 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:32:24.705613 kubelet[1668]: E0212 19:32:24.705601 1668 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.23:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.708320 kubelet[1668]: I0212 19:32:24.708301 1668 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:32:24.708506 kubelet[1668]: I0212 19:32:24.708493 1668 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:32:24.708566 kubelet[1668]: I0212 19:32:24.708555 1668 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:32:24.708646 kubelet[1668]: I0212 19:32:24.708570 1668 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:32:24.708646 kubelet[1668]: I0212 19:32:24.708580 1668 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:32:24.708709 kubelet[1668]: I0212 19:32:24.708651 1668 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:32:24.710711 kubelet[1668]: I0212 19:32:24.710699 1668 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:32:24.710751 kubelet[1668]: I0212 19:32:24.710714 1668 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:32:24.710751 kubelet[1668]: I0212 19:32:24.710732 1668 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:32:24.710751 kubelet[1668]: I0212 19:32:24.710742 1668 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:32:24.711317 kubelet[1668]: W0212 19:32:24.711260 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.711317 kubelet[1668]: E0212 19:32:24.711297 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.711382 kubelet[1668]: I0212 19:32:24.711352 1668 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:32:24.711382 kubelet[1668]: W0212 19:32:24.711345 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.711423 kubelet[1668]: E0212 19:32:24.711405 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.711604 kubelet[1668]: W0212 19:32:24.711591 1668 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:32:24.711949 kubelet[1668]: I0212 19:32:24.711936 1668 server.go:1168] "Started kubelet" Feb 12 19:32:24.712143 kubelet[1668]: I0212 19:32:24.712125 1668 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:32:24.712143 kubelet[1668]: I0212 19:32:24.712139 1668 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:32:24.712549 kubelet[1668]: E0212 19:32:24.712481 1668 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b334713febd0b2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 32, 24, 711917746, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 32, 24, 711917746, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.23:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.23:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:32:24.712972 kubelet[1668]: I0212 19:32:24.712957 1668 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:32:24.714130 kubelet[1668]: E0212 19:32:24.713423 1668 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:32:24.714173 kubelet[1668]: E0212 19:32:24.714141 1668 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:32:24.714000 audit[1668]: AVC avc: denied { mac_admin } for pid=1668 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.714000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:32:24.714000 audit[1668]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac0480 a1=c000d54630 a2=c000ac0450 a3=25 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.714000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:32:24.714000 audit[1668]: AVC avc: denied { mac_admin } for pid=1668 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.714000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:32:24.714000 audit[1668]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000161380 a1=c000d54648 a2=c000ac05d0 a3=25 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.714000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:32:24.716048 kubelet[1668]: I0212 19:32:24.715788 1668 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:32:24.716048 kubelet[1668]: I0212 19:32:24.715821 1668 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:32:24.716048 kubelet[1668]: I0212 19:32:24.715886 1668 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:32:24.716513 kubelet[1668]: E0212 19:32:24.716494 1668 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:32:24.716554 kubelet[1668]: I0212 19:32:24.716520 1668 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:32:24.716613 kubelet[1668]: I0212 19:32:24.716598 1668 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:32:24.717094 kubelet[1668]: E0212 19:32:24.717079 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="200ms" Feb 12 19:32:24.717144 kubelet[1668]: W0212 19:32:24.717121 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.717168 kubelet[1668]: E0212 19:32:24.717149 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.716000 audit[1680]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.716000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1493deb0 a2=0 a3=7ffd1493de9c items=0 ppid=1668 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:32:24.717000 audit[1681]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.717000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9926c2d0 a2=0 a3=7ffc9926c2bc items=0 ppid=1668 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:32:24.718000 audit[1683]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.718000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc37f22f0 a2=0 a3=7fffc37f22dc items=0 ppid=1668 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:32:24.720000 audit[1685]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.720000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff05fd4260 a2=0 a3=7fff05fd424c items=0 ppid=1668 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:32:24.723000 audit[1688]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.723000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffee5d6df40 a2=0 a3=7ffee5d6df2c items=0 ppid=1668 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:32:24.725642 kubelet[1668]: I0212 19:32:24.725618 1668 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:32:24.724000 audit[1689]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:24.724000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc93ca7040 a2=0 a3=7ffc93ca702c items=0 ppid=1668 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:32:24.726421 kubelet[1668]: I0212 19:32:24.726286 1668 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:32:24.726421 kubelet[1668]: I0212 19:32:24.726304 1668 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:32:24.726421 kubelet[1668]: I0212 19:32:24.726322 1668 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:32:24.726421 kubelet[1668]: E0212 19:32:24.726368 1668 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:32:24.725000 audit[1691]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.725000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe342e8bf0 a2=0 a3=7ffe342e8bdc items=0 ppid=1668 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.725000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:32:24.726000 audit[1692]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.726000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd29d4a6d0 a2=0 a3=7ffd29d4a6bc items=0 ppid=1668 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:32:24.726000 audit[1693]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:24.726000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea677a1e0 a2=0 a3=7ffea677a1cc items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:32:24.727000 audit[1694]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:24.727000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3c45e620 a2=0 a3=7ffd3c45e60c items=0 ppid=1668 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:32:24.728000 audit[1695]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:24.728000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd1bcc2010 a2=0 a3=7ffd1bcc1ffc items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:32:24.728000 audit[1697]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:24.728000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc52f3d420 a2=0 a3=7ffc52f3d40c items=0 ppid=1668 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:32:24.731133 kubelet[1668]: W0212 19:32:24.731097 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.731190 kubelet[1668]: E0212 19:32:24.731142 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:24.731904 kubelet[1668]: I0212 19:32:24.731892 1668 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:32:24.731904 kubelet[1668]: I0212 19:32:24.731904 1668 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:32:24.731974 kubelet[1668]: I0212 19:32:24.731914 1668 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:32:24.734519 kubelet[1668]: I0212 19:32:24.734503 1668 policy_none.go:49] "None policy: Start" Feb 12 19:32:24.735085 kubelet[1668]: I0212 19:32:24.735069 1668 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:32:24.735149 kubelet[1668]: I0212 19:32:24.735089 1668 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:32:24.739838 systemd[1]: Created slice kubepods.slice. Feb 12 19:32:24.742546 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:32:24.744393 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:32:24.749207 kubelet[1668]: I0212 19:32:24.749179 1668 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:32:24.747000 audit[1668]: AVC avc: denied { mac_admin } for pid=1668 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:24.747000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:32:24.747000 audit[1668]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b58a80 a1=c00108e5d0 a2=c000b58a50 a3=25 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:24.747000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:32:24.750068 kubelet[1668]: I0212 19:32:24.749237 1668 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:32:24.750068 kubelet[1668]: I0212 19:32:24.749351 1668 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:32:24.750068 kubelet[1668]: E0212 19:32:24.749589 1668 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 19:32:24.817965 kubelet[1668]: I0212 19:32:24.817945 1668 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:32:24.818268 kubelet[1668]: E0212 19:32:24.818251 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" Feb 12 19:32:24.827334 kubelet[1668]: I0212 19:32:24.827313 1668 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:24.827867 kubelet[1668]: I0212 19:32:24.827845 1668 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:24.828521 kubelet[1668]: I0212 19:32:24.828506 1668 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:24.831605 systemd[1]: Created slice kubepods-burstable-pode163348697e10c156be90481fdc64669.slice. Feb 12 19:32:24.851281 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 12 19:32:24.854009 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 12 19:32:24.917429 kubelet[1668]: I0212 19:32:24.917387 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:24.917486 kubelet[1668]: I0212 19:32:24.917471 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:24.917486 kubelet[1668]: E0212 19:32:24.917475 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="400ms" Feb 12 19:32:24.917532 kubelet[1668]: I0212 19:32:24.917495 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:32:24.917532 kubelet[1668]: I0212 19:32:24.917517 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:24.917587 kubelet[1668]: I0212 19:32:24.917536 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:24.917587 kubelet[1668]: I0212 19:32:24.917553 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:24.917587 kubelet[1668]: I0212 19:32:24.917577 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e163348697e10c156be90481fdc64669-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e163348697e10c156be90481fdc64669\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:24.917650 kubelet[1668]: I0212 19:32:24.917612 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e163348697e10c156be90481fdc64669-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e163348697e10c156be90481fdc64669\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:24.917650 kubelet[1668]: I0212 19:32:24.917640 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e163348697e10c156be90481fdc64669-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e163348697e10c156be90481fdc64669\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:25.019581 kubelet[1668]: I0212 19:32:25.019527 1668 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:32:25.019795 kubelet[1668]: E0212 19:32:25.019779 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" Feb 12 19:32:25.150333 kubelet[1668]: E0212 19:32:25.150318 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:25.150870 env[1123]: time="2024-02-12T19:32:25.150838523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e163348697e10c156be90481fdc64669,Namespace:kube-system,Attempt:0,}" Feb 12 19:32:25.153080 kubelet[1668]: E0212 19:32:25.153055 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:25.153493 env[1123]: time="2024-02-12T19:32:25.153444288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 12 19:32:25.155539 kubelet[1668]: E0212 19:32:25.155522 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:25.155769 env[1123]: time="2024-02-12T19:32:25.155748389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 12 19:32:25.318777 kubelet[1668]: E0212 19:32:25.318712 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.23:6443: connect: connection refused" interval="800ms" Feb 12 19:32:25.421037 kubelet[1668]: I0212 19:32:25.421006 1668 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:32:25.421261 kubelet[1668]: E0212 19:32:25.421236 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.23:6443/api/v1/nodes\": dial tcp 10.0.0.23:6443: connect: connection refused" node="localhost" Feb 12 19:32:25.637646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount435599288.mount: Deactivated successfully. Feb 12 19:32:25.642060 env[1123]: time="2024-02-12T19:32:25.641994790Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.644542 env[1123]: time="2024-02-12T19:32:25.644507842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.645935 env[1123]: time="2024-02-12T19:32:25.645911314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.646716 env[1123]: time="2024-02-12T19:32:25.646686738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.648126 env[1123]: time="2024-02-12T19:32:25.648099096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.649260 env[1123]: time="2024-02-12T19:32:25.649236408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.650587 env[1123]: time="2024-02-12T19:32:25.650556063Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.652436 env[1123]: time="2024-02-12T19:32:25.652391614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.654737 env[1123]: time="2024-02-12T19:32:25.654716353Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.655276 env[1123]: time="2024-02-12T19:32:25.655249533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.656654 env[1123]: time="2024-02-12T19:32:25.656630542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.657195 env[1123]: time="2024-02-12T19:32:25.657166197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:25.682867 env[1123]: time="2024-02-12T19:32:25.682782788Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:25.683024 env[1123]: time="2024-02-12T19:32:25.682838302Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:25.683024 env[1123]: time="2024-02-12T19:32:25.682854582Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:25.683024 env[1123]: time="2024-02-12T19:32:25.682985608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3a342ffa015f5f61d62eb3e4fdd25ea7d277fb682c945d790245eee531606390 pid=1716 runtime=io.containerd.runc.v2 Feb 12 19:32:25.683210 env[1123]: time="2024-02-12T19:32:25.683048055Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:25.683210 env[1123]: time="2024-02-12T19:32:25.683078442Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:25.683210 env[1123]: time="2024-02-12T19:32:25.683091417Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:25.683358 env[1123]: time="2024-02-12T19:32:25.683205240Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50884974cf6009ebb3aad13d7a824e8a84a42400147631c4e584fb60f32ccf3e pid=1717 runtime=io.containerd.runc.v2 Feb 12 19:32:25.687482 kubelet[1668]: W0212 19:32:25.687409 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:25.687482 kubelet[1668]: E0212 19:32:25.687474 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:25.688701 env[1123]: time="2024-02-12T19:32:25.688581500Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:25.688701 env[1123]: time="2024-02-12T19:32:25.688642515Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:25.688824 env[1123]: time="2024-02-12T19:32:25.688655549Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:25.688921 env[1123]: time="2024-02-12T19:32:25.688896331Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e1138127bd92261cd82dfe558725d964cb368b153fe5827e3b69d2301030693 pid=1739 runtime=io.containerd.runc.v2 Feb 12 19:32:25.701142 systemd[1]: Started cri-containerd-3a342ffa015f5f61d62eb3e4fdd25ea7d277fb682c945d790245eee531606390.scope. Feb 12 19:32:25.708992 systemd[1]: Started cri-containerd-50884974cf6009ebb3aad13d7a824e8a84a42400147631c4e584fb60f32ccf3e.scope. Feb 12 19:32:25.724468 systemd[1]: Started cri-containerd-3e1138127bd92261cd82dfe558725d964cb368b153fe5827e3b69d2301030693.scope. Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit: BPF prog-id=67 op=LOAD Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1717 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383834393734636636303039656262336161643133643761383234 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1717 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383834393734636636303039656262336161643133643761383234 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.744000 audit: BPF prog-id=68 op=LOAD Feb 12 19:32:25.744000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003585a0 items=0 ppid=1717 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383834393734636636303039656262336161643133643761383234 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit: BPF prog-id=69 op=LOAD Feb 12 19:32:25.745000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003585e8 items=0 ppid=1717 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383834393734636636303039656262336161643133643761383234 Feb 12 19:32:25.745000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:32:25.745000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.745000 audit: BPF prog-id=70 op=LOAD Feb 12 19:32:25.745000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003589f8 items=0 ppid=1717 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383834393734636636303039656262336161643133643761383234 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.751000 audit: BPF prog-id=71 op=LOAD Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit: BPF prog-id=72 op=LOAD Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1716 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333432666661303135663566363164363265623365346664643235 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1716 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333432666661303135663566363164363265623365346664643235 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.753000 audit: BPF prog-id=73 op=LOAD Feb 12 19:32:25.753000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030cb40 items=0 ppid=1716 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333432666661303135663566363164363265623365346664643235 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit: BPF prog-id=74 op=LOAD Feb 12 19:32:25.754000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030cb88 items=0 ppid=1716 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333432666661303135663566363164363265623365346664643235 Feb 12 19:32:25.754000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:32:25.754000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit: BPF prog-id=75 op=LOAD Feb 12 19:32:25.754000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030cf98 items=0 ppid=1716 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333432666661303135663566363164363265623365346664643235 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1739 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313133383132376264393232363163643832646665353538373235 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1739 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313133383132376264393232363163643832646665353538373235 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit: BPF prog-id=76 op=LOAD Feb 12 19:32:25.754000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000317480 items=0 ppid=1739 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313133383132376264393232363163643832646665353538373235 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.754000 audit: BPF prog-id=77 op=LOAD Feb 12 19:32:25.754000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003174c8 items=0 ppid=1739 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313133383132376264393232363163643832646665353538373235 Feb 12 19:32:25.755000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:32:25.755000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.755000 audit: BPF prog-id=78 op=LOAD Feb 12 19:32:25.755000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003178d8 items=0 ppid=1739 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313133383132376264393232363163643832646665353538373235 Feb 12 19:32:25.767700 kubelet[1668]: W0212 19:32:25.767610 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:25.767700 kubelet[1668]: E0212 19:32:25.767703 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:25.781012 env[1123]: time="2024-02-12T19:32:25.780602089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e163348697e10c156be90481fdc64669,Namespace:kube-system,Attempt:0,} returns sandbox id \"50884974cf6009ebb3aad13d7a824e8a84a42400147631c4e584fb60f32ccf3e\"" Feb 12 19:32:25.781761 kubelet[1668]: W0212 19:32:25.781697 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:25.781818 kubelet[1668]: E0212 19:32:25.781770 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.23:6443: connect: connection refused Feb 12 19:32:25.786612 kubelet[1668]: E0212 19:32:25.786452 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:25.789816 env[1123]: time="2024-02-12T19:32:25.789783675Z" level=info msg="CreateContainer within sandbox \"50884974cf6009ebb3aad13d7a824e8a84a42400147631c4e584fb60f32ccf3e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:32:25.792221 env[1123]: time="2024-02-12T19:32:25.792193333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e1138127bd92261cd82dfe558725d964cb368b153fe5827e3b69d2301030693\"" Feb 12 19:32:25.794302 kubelet[1668]: E0212 19:32:25.794272 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:25.796709 env[1123]: time="2024-02-12T19:32:25.796318918Z" level=info msg="CreateContainer within sandbox \"3e1138127bd92261cd82dfe558725d964cb368b153fe5827e3b69d2301030693\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:32:25.797007 env[1123]: time="2024-02-12T19:32:25.796975028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"3a342ffa015f5f61d62eb3e4fdd25ea7d277fb682c945d790245eee531606390\"" Feb 12 19:32:25.797624 kubelet[1668]: E0212 19:32:25.797517 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:25.798868 env[1123]: time="2024-02-12T19:32:25.798849373Z" level=info msg="CreateContainer within sandbox \"3a342ffa015f5f61d62eb3e4fdd25ea7d277fb682c945d790245eee531606390\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:32:25.810280 env[1123]: time="2024-02-12T19:32:25.810224130Z" level=info msg="CreateContainer within sandbox \"50884974cf6009ebb3aad13d7a824e8a84a42400147631c4e584fb60f32ccf3e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7f9f67e9dde4b5b2ad40647e3515b5f2589e3d4d510e955e1737ffb5ebfdce62\"" Feb 12 19:32:25.810849 env[1123]: time="2024-02-12T19:32:25.810821801Z" level=info msg="StartContainer for \"7f9f67e9dde4b5b2ad40647e3515b5f2589e3d4d510e955e1737ffb5ebfdce62\"" Feb 12 19:32:25.818051 env[1123]: time="2024-02-12T19:32:25.818002655Z" level=info msg="CreateContainer within sandbox \"3e1138127bd92261cd82dfe558725d964cb368b153fe5827e3b69d2301030693\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6a7cbe71bbd29afb86cb97052bf45f7e3ff78fc3b7f51001f9f420743eda6625\"" Feb 12 19:32:25.818462 env[1123]: time="2024-02-12T19:32:25.818435046Z" level=info msg="StartContainer for \"6a7cbe71bbd29afb86cb97052bf45f7e3ff78fc3b7f51001f9f420743eda6625\"" Feb 12 19:32:25.820026 env[1123]: time="2024-02-12T19:32:25.819992476Z" level=info msg="CreateContainer within sandbox \"3a342ffa015f5f61d62eb3e4fdd25ea7d277fb682c945d790245eee531606390\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b2ba327f92ad03103daedd06452740ec9b918665681bb9f6beb9745b038ef63a\"" Feb 12 19:32:25.820525 env[1123]: time="2024-02-12T19:32:25.820507331Z" level=info msg="StartContainer for \"b2ba327f92ad03103daedd06452740ec9b918665681bb9f6beb9745b038ef63a\"" Feb 12 19:32:25.824066 systemd[1]: Started cri-containerd-7f9f67e9dde4b5b2ad40647e3515b5f2589e3d4d510e955e1737ffb5ebfdce62.scope. Feb 12 19:32:25.837043 systemd[1]: Started cri-containerd-b2ba327f92ad03103daedd06452740ec9b918665681bb9f6beb9745b038ef63a.scope. Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.837000 audit: BPF prog-id=79 op=LOAD Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1717 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396636376539646465346235623261643430363437653335313562 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1717 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396636376539646465346235623261643430363437653335313562 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit: BPF prog-id=80 op=LOAD Feb 12 19:32:25.838000 audit[1836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a1c70 items=0 ppid=1717 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396636376539646465346235623261643430363437653335313562 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit: BPF prog-id=81 op=LOAD Feb 12 19:32:25.838000 audit[1836]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a1cb8 items=0 ppid=1717 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396636376539646465346235623261643430363437653335313562 Feb 12 19:32:25.838000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:32:25.838000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { perfmon } for pid=1836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit[1836]: AVC avc: denied { bpf } for pid=1836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.838000 audit: BPF prog-id=82 op=LOAD Feb 12 19:32:25.838000 audit[1836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004080c8 items=0 ppid=1717 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766396636376539646465346235623261643430363437653335313562 Feb 12 19:32:25.846194 systemd[1]: Started cri-containerd-6a7cbe71bbd29afb86cb97052bf45f7e3ff78fc3b7f51001f9f420743eda6625.scope. Feb 12 19:32:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit: BPF prog-id=83 op=LOAD Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626133323766393261643033313033646165646430363435323734 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626133323766393261643033313033646165646430363435323734 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit: BPF prog-id=84 op=LOAD Feb 12 19:32:25.852000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003b8870 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626133323766393261643033313033646165646430363435323734 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit: BPF prog-id=85 op=LOAD Feb 12 19:32:25.852000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003b88b8 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626133323766393261643033313033646165646430363435323734 Feb 12 19:32:25.852000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:32:25.852000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { perfmon } for pid=1862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit[1862]: AVC avc: denied { bpf } for pid=1862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.852000 audit: BPF prog-id=86 op=LOAD Feb 12 19:32:25.852000 audit[1862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003b8cc8 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626133323766393261643033313033646165646430363435323734 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.860000 audit: BPF prog-id=87 op=LOAD Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1739 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376362653731626264323961666238366362393730353262663435 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1739 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376362653731626264323961666238366362393730353262663435 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit: BPF prog-id=88 op=LOAD Feb 12 19:32:25.861000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00024ddf0 items=0 ppid=1739 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376362653731626264323961666238366362393730353262663435 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit: BPF prog-id=89 op=LOAD Feb 12 19:32:25.861000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00024de38 items=0 ppid=1739 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376362653731626264323961666238366362393730353262663435 Feb 12 19:32:25.861000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:32:25.861000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:25.861000 audit: BPF prog-id=90 op=LOAD Feb 12 19:32:25.861000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ac248 items=0 ppid=1739 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:25.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376362653731626264323961666238366362393730353262663435 Feb 12 19:32:25.869658 env[1123]: time="2024-02-12T19:32:25.869617874Z" level=info msg="StartContainer for \"7f9f67e9dde4b5b2ad40647e3515b5f2589e3d4d510e955e1737ffb5ebfdce62\" returns successfully" Feb 12 19:32:25.885892 env[1123]: time="2024-02-12T19:32:25.885845040Z" level=info msg="StartContainer for \"b2ba327f92ad03103daedd06452740ec9b918665681bb9f6beb9745b038ef63a\" returns successfully" Feb 12 19:32:25.893541 env[1123]: time="2024-02-12T19:32:25.893454838Z" level=info msg="StartContainer for \"6a7cbe71bbd29afb86cb97052bf45f7e3ff78fc3b7f51001f9f420743eda6625\" returns successfully" Feb 12 19:32:26.223083 kubelet[1668]: I0212 19:32:26.223053 1668 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:32:26.566000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:26.575204 kernel: kauditd_printk_skb: 559 callbacks suppressed Feb 12 19:32:26.575260 kernel: audit: type=1400 audit(1707766346.566:693): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:26.575294 kernel: audit: type=1300 audit(1707766346.566:693): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00051a020 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:26.566000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00051a020 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:26.578954 kernel: audit: type=1327 audit(1707766346.566:693): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:26.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:26.582149 kernel: audit: type=1400 audit(1707766346.566:694): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:26.566000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:26.586527 kernel: audit: type=1300 audit(1707766346.566:694): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cf4000 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:26.566000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cf4000 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:26.589405 kernel: audit: type=1327 audit(1707766346.566:694): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:26.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:26.737089 kubelet[1668]: E0212 19:32:26.737007 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:26.739099 kubelet[1668]: E0212 19:32:26.739072 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:26.740772 kubelet[1668]: E0212 19:32:26.740763 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:27.263000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.263000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003774060 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.271716 kernel: audit: type=1400 audit(1707766347.263:695): avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.271818 kernel: audit: type=1300 audit(1707766347.263:695): arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003774060 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.271837 kernel: audit: type=1327 audit(1707766347.263:695): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.263000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.276569 kernel: audit: type=1400 audit(1707766347.263:696): avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.263000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c00724e020 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.263000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.263000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0037741e0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.286000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.286000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00378b980 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.287000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.287000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c004890520 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.287000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:27.287000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c0037cd680 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:32:27.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:32:27.342588 kubelet[1668]: I0212 19:32:27.342547 1668 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:32:27.716623 kubelet[1668]: I0212 19:32:27.716572 1668 apiserver.go:52] "Watching apiserver" Feb 12 19:32:27.745694 kubelet[1668]: E0212 19:32:27.745643 1668 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:27.746164 kubelet[1668]: E0212 19:32:27.746148 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:27.817829 kubelet[1668]: I0212 19:32:27.817801 1668 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:32:27.871321 kubelet[1668]: I0212 19:32:27.871284 1668 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:32:29.609984 systemd[1]: Reloading. Feb 12 19:32:29.677599 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2024-02-12T19:32:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:32:29.677622 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2024-02-12T19:32:29Z" level=info msg="torcx already run" Feb 12 19:32:29.733454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:32:29.733472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:32:29.750078 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit: BPF prog-id=91 op=LOAD Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.815000 audit: BPF prog-id=92 op=LOAD Feb 12 19:32:29.815000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:32:29.815000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.816000 audit: BPF prog-id=93 op=LOAD Feb 12 19:32:29.816000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.818000 audit: BPF prog-id=94 op=LOAD Feb 12 19:32:29.818000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.819000 audit: BPF prog-id=95 op=LOAD Feb 12 19:32:29.819000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.820000 audit: BPF prog-id=96 op=LOAD Feb 12 19:32:29.820000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.821000 audit: BPF prog-id=97 op=LOAD Feb 12 19:32:29.821000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit: BPF prog-id=98 op=LOAD Feb 12 19:32:29.822000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit: BPF prog-id=99 op=LOAD Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.822000 audit: BPF prog-id=100 op=LOAD Feb 12 19:32:29.822000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:32:29.822000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit: BPF prog-id=101 op=LOAD Feb 12 19:32:29.824000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit: BPF prog-id=102 op=LOAD Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit: BPF prog-id=103 op=LOAD Feb 12 19:32:29.824000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:32:29.824000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.824000 audit: BPF prog-id=104 op=LOAD Feb 12 19:32:29.824000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit: BPF prog-id=105 op=LOAD Feb 12 19:32:29.825000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.825000 audit: BPF prog-id=106 op=LOAD Feb 12 19:32:29.825000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit: BPF prog-id=107 op=LOAD Feb 12 19:32:29.827000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.827000 audit: BPF prog-id=108 op=LOAD Feb 12 19:32:29.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit: BPF prog-id=109 op=LOAD Feb 12 19:32:29.828000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:32:29.828000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.828000 audit: BPF prog-id=110 op=LOAD Feb 12 19:32:29.828000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.829000 audit: BPF prog-id=111 op=LOAD Feb 12 19:32:29.829000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:32:29.842556 kubelet[1668]: I0212 19:32:29.840340 1668 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:32:29.840457 systemd[1]: Stopping kubelet.service... Feb 12 19:32:29.863963 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:32:29.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:29.864125 systemd[1]: Stopped kubelet.service. Feb 12 19:32:29.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:29.866092 systemd[1]: Started kubelet.service. Feb 12 19:32:29.911210 kubelet[2010]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:32:29.911210 kubelet[2010]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:32:29.911210 kubelet[2010]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:32:29.911575 kubelet[2010]: I0212 19:32:29.911262 2010 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:32:29.915631 kubelet[2010]: I0212 19:32:29.915609 2010 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:32:29.915733 kubelet[2010]: I0212 19:32:29.915719 2010 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:32:29.916042 kubelet[2010]: I0212 19:32:29.916028 2010 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:32:29.917494 kubelet[2010]: I0212 19:32:29.917466 2010 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:32:29.918288 kubelet[2010]: I0212 19:32:29.918266 2010 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:32:29.921922 kubelet[2010]: I0212 19:32:29.921902 2010 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:32:29.922092 kubelet[2010]: I0212 19:32:29.922075 2010 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:32:29.922150 kubelet[2010]: I0212 19:32:29.922136 2010 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:32:29.922224 kubelet[2010]: I0212 19:32:29.922155 2010 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:32:29.922224 kubelet[2010]: I0212 19:32:29.922164 2010 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:32:29.922224 kubelet[2010]: I0212 19:32:29.922188 2010 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:32:29.924964 kubelet[2010]: I0212 19:32:29.924944 2010 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:32:29.924964 kubelet[2010]: I0212 19:32:29.924966 2010 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:32:29.925035 kubelet[2010]: I0212 19:32:29.924982 2010 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:32:29.925035 kubelet[2010]: I0212 19:32:29.924998 2010 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:32:29.925658 kubelet[2010]: I0212 19:32:29.925640 2010 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:32:29.926155 kubelet[2010]: I0212 19:32:29.926141 2010 server.go:1168] "Started kubelet" Feb 12 19:32:29.926000 audit[2010]: AVC avc: denied { mac_admin } for pid=2010 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.926000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:32:29.926000 audit[2010]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d3e060 a1=c000d3c0f0 a2=c000d3e030 a3=25 items=0 ppid=1 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:29.926000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:32:29.928435 kubelet[2010]: I0212 19:32:29.928410 2010 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:32:29.926000 audit[2010]: AVC avc: denied { mac_admin } for pid=2010 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.926000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:32:29.926000 audit[2010]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009438c0 a1=c000d3c108 a2=c000d3e0f0 a3=25 items=0 ppid=1 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:29.926000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:32:29.928845 kubelet[2010]: E0212 19:32:29.928821 2010 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:32:29.928915 kubelet[2010]: E0212 19:32:29.928874 2010 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:32:29.929387 kubelet[2010]: I0212 19:32:29.929371 2010 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:32:29.929488 kubelet[2010]: I0212 19:32:29.929474 2010 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:32:29.929628 kubelet[2010]: I0212 19:32:29.929604 2010 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:32:29.930223 kubelet[2010]: I0212 19:32:29.930198 2010 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:32:29.931080 kubelet[2010]: I0212 19:32:29.931060 2010 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:32:29.944707 kubelet[2010]: I0212 19:32:29.943545 2010 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:32:29.944707 kubelet[2010]: I0212 19:32:29.943626 2010 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:32:29.949039 kubelet[2010]: I0212 19:32:29.949009 2010 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:32:29.949839 kubelet[2010]: I0212 19:32:29.949825 2010 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:32:29.949884 kubelet[2010]: I0212 19:32:29.949847 2010 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:32:29.949884 kubelet[2010]: I0212 19:32:29.949860 2010 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:32:29.949935 kubelet[2010]: E0212 19:32:29.949899 2010 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:32:29.978702 kubelet[2010]: I0212 19:32:29.978658 2010 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:32:29.978868 kubelet[2010]: I0212 19:32:29.978855 2010 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:32:29.978942 kubelet[2010]: I0212 19:32:29.978930 2010 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:32:29.979154 kubelet[2010]: I0212 19:32:29.979142 2010 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:32:29.979230 kubelet[2010]: I0212 19:32:29.979218 2010 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:32:29.979300 kubelet[2010]: I0212 19:32:29.979287 2010 policy_none.go:49] "None policy: Start" Feb 12 19:32:29.979910 kubelet[2010]: I0212 19:32:29.979882 2010 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:32:29.979910 kubelet[2010]: I0212 19:32:29.979901 2010 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:32:29.980017 kubelet[2010]: I0212 19:32:29.979999 2010 state_mem.go:75] "Updated machine memory state" Feb 12 19:32:29.983248 kubelet[2010]: I0212 19:32:29.983223 2010 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:32:29.983326 kubelet[2010]: I0212 19:32:29.983286 2010 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:32:29.981000 audit[2010]: AVC avc: denied { mac_admin } for pid=2010 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:29.981000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:32:29.981000 audit[2010]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cfab10 a1=c000235fe0 a2=c000cfaae0 a3=25 items=0 ppid=1 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:29.981000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:32:29.988442 kubelet[2010]: I0212 19:32:29.985518 2010 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:32:30.039105 kubelet[2010]: I0212 19:32:30.039081 2010 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:32:30.047244 kubelet[2010]: I0212 19:32:30.047214 2010 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 19:32:30.047405 kubelet[2010]: I0212 19:32:30.047297 2010 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:32:30.050802 kubelet[2010]: I0212 19:32:30.050758 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:30.050931 kubelet[2010]: I0212 19:32:30.050861 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:30.050931 kubelet[2010]: I0212 19:32:30.050895 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:30.249797 kubelet[2010]: I0212 19:32:30.249765 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:30.250010 kubelet[2010]: I0212 19:32:30.249995 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:30.250099 kubelet[2010]: I0212 19:32:30.250086 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:32:30.250231 kubelet[2010]: I0212 19:32:30.250217 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e163348697e10c156be90481fdc64669-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e163348697e10c156be90481fdc64669\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:30.250322 kubelet[2010]: I0212 19:32:30.250309 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e163348697e10c156be90481fdc64669-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e163348697e10c156be90481fdc64669\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:30.250409 kubelet[2010]: I0212 19:32:30.250395 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:30.250513 kubelet[2010]: I0212 19:32:30.250500 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:30.250602 kubelet[2010]: I0212 19:32:30.250589 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e163348697e10c156be90481fdc64669-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e163348697e10c156be90481fdc64669\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:30.250712 kubelet[2010]: I0212 19:32:30.250699 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:32:30.356743 kubelet[2010]: E0212 19:32:30.356703 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:30.357187 kubelet[2010]: E0212 19:32:30.357154 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:30.357467 kubelet[2010]: E0212 19:32:30.357449 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:30.925777 kubelet[2010]: I0212 19:32:30.925722 2010 apiserver.go:52] "Watching apiserver" Feb 12 19:32:30.944393 kubelet[2010]: I0212 19:32:30.944356 2010 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:32:30.955963 kubelet[2010]: I0212 19:32:30.955917 2010 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:32:30.956944 kubelet[2010]: E0212 19:32:30.956920 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:30.957385 kubelet[2010]: E0212 19:32:30.957371 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:30.962537 kubelet[2010]: E0212 19:32:30.962508 2010 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:32:30.962899 kubelet[2010]: E0212 19:32:30.962869 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:30.973378 kubelet[2010]: I0212 19:32:30.973342 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=0.973308518 podCreationTimestamp="2024-02-12 19:32:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:32:30.972348969 +0000 UTC m=+1.103410146" watchObservedRunningTime="2024-02-12 19:32:30.973308518 +0000 UTC m=+1.104369705" Feb 12 19:32:30.984325 kubelet[2010]: I0212 19:32:30.984294 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.984275212 podCreationTimestamp="2024-02-12 19:32:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:32:30.979339409 +0000 UTC m=+1.110400596" watchObservedRunningTime="2024-02-12 19:32:30.984275212 +0000 UTC m=+1.115336389" Feb 12 19:32:30.990218 kubelet[2010]: I0212 19:32:30.990197 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=0.990178097 podCreationTimestamp="2024-02-12 19:32:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:32:30.984359332 +0000 UTC m=+1.115420519" watchObservedRunningTime="2024-02-12 19:32:30.990178097 +0000 UTC m=+1.121239284" Feb 12 19:32:31.958483 kubelet[2010]: E0212 19:32:31.958451 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:31.959552 kubelet[2010]: E0212 19:32:31.959217 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:31.959659 kubelet[2010]: E0212 19:32:31.959356 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:32.959561 kubelet[2010]: E0212 19:32:32.959519 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:35.005906 sudo[1253]: pam_unix(sudo:session): session closed for user root Feb 12 19:32:35.005000 audit[1253]: USER_END pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:32:35.007803 sshd[1250]: pam_unix(sshd:session): session closed for user core Feb 12 19:32:35.009275 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 12 19:32:35.009344 kernel: audit: type=1106 audit(1707766355.005:950): pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:32:35.009373 kernel: audit: type=1104 audit(1707766355.005:951): pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:32:35.005000 audit[1253]: CRED_DISP pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:32:35.009877 systemd[1]: sshd@6-10.0.0.23:22-10.0.0.1:39108.service: Deactivated successfully. Feb 12 19:32:35.010503 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:32:35.010639 systemd[1]: session-7.scope: Consumed 3.491s CPU time. Feb 12 19:32:35.011008 systemd-logind[1112]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:32:35.008000 audit[1250]: USER_END pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:32:35.011661 systemd-logind[1112]: Removed session 7. Feb 12 19:32:35.014493 kernel: audit: type=1106 audit(1707766355.008:952): pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:32:35.014546 kernel: audit: type=1104 audit(1707766355.008:953): pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:32:35.008000 audit[1250]: CRED_DISP pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:32:35.016809 kernel: audit: type=1131 audit(1707766355.009:954): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.23:22-10.0.0.1:39108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:35.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.23:22-10.0.0.1:39108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:39.455358 update_engine[1113]: I0212 19:32:39.455299 1113 update_attempter.cc:509] Updating boot flags... Feb 12 19:32:40.692000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.692000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edfb40 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.699085 kernel: audit: type=1400 audit(1707766360.692:955): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.699193 kernel: audit: type=1300 audit(1707766360.692:955): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edfb40 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.699218 kernel: audit: type=1327 audit(1707766360.692:955): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.692000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.702097 kernel: audit: type=1400 audit(1707766360.692:956): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.692000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.692000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fe2900 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.708453 kernel: audit: type=1300 audit(1707766360.692:956): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fe2900 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.708516 kernel: audit: type=1327 audit(1707766360.692:956): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.692000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.711436 kernel: audit: type=1400 audit(1707766360.693:957): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.693000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.693000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fe2a40 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.717841 kernel: audit: type=1300 audit(1707766360.693:957): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fe2a40 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.717903 kernel: audit: type=1327 audit(1707766360.693:957): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.694000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.723473 kernel: audit: type=1400 audit(1707766360.694:958): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:32:40.694000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edfb80 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.694000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:40.699000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:32:40.699000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003999c0 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:32:40.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:32:41.384811 kubelet[2010]: E0212 19:32:41.384775 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:41.775182 kubelet[2010]: E0212 19:32:41.775151 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:41.828519 kubelet[2010]: E0212 19:32:41.828488 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:42.472949 kubelet[2010]: I0212 19:32:42.472907 2010 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:32:42.473365 env[1123]: time="2024-02-12T19:32:42.473236423Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:32:42.473603 kubelet[2010]: I0212 19:32:42.473402 2010 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:32:43.279332 kubelet[2010]: I0212 19:32:43.279287 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:43.284077 systemd[1]: Created slice kubepods-besteffort-pod31fee376_a49d_47a5_8601_466ba75354ee.slice. Feb 12 19:32:43.332517 kubelet[2010]: I0212 19:32:43.332456 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vtb4w\" (UniqueName: \"kubernetes.io/projected/31fee376-a49d-47a5-8601-466ba75354ee-kube-api-access-vtb4w\") pod \"kube-proxy-hwxp5\" (UID: \"31fee376-a49d-47a5-8601-466ba75354ee\") " pod="kube-system/kube-proxy-hwxp5" Feb 12 19:32:43.332659 kubelet[2010]: I0212 19:32:43.332535 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/31fee376-a49d-47a5-8601-466ba75354ee-lib-modules\") pod \"kube-proxy-hwxp5\" (UID: \"31fee376-a49d-47a5-8601-466ba75354ee\") " pod="kube-system/kube-proxy-hwxp5" Feb 12 19:32:43.332659 kubelet[2010]: I0212 19:32:43.332559 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/31fee376-a49d-47a5-8601-466ba75354ee-kube-proxy\") pod \"kube-proxy-hwxp5\" (UID: \"31fee376-a49d-47a5-8601-466ba75354ee\") " pod="kube-system/kube-proxy-hwxp5" Feb 12 19:32:43.332659 kubelet[2010]: I0212 19:32:43.332576 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/31fee376-a49d-47a5-8601-466ba75354ee-xtables-lock\") pod \"kube-proxy-hwxp5\" (UID: \"31fee376-a49d-47a5-8601-466ba75354ee\") " pod="kube-system/kube-proxy-hwxp5" Feb 12 19:32:43.440213 kubelet[2010]: I0212 19:32:43.440163 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:43.447220 systemd[1]: Created slice kubepods-besteffort-pod5aafbe19_2342_4996_98fb_f7d7318950aa.slice. Feb 12 19:32:43.534308 kubelet[2010]: I0212 19:32:43.534173 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ptc22\" (UniqueName: \"kubernetes.io/projected/5aafbe19-2342-4996-98fb-f7d7318950aa-kube-api-access-ptc22\") pod \"tigera-operator-7ff8dc855-qbk7s\" (UID: \"5aafbe19-2342-4996-98fb-f7d7318950aa\") " pod="tigera-operator/tigera-operator-7ff8dc855-qbk7s" Feb 12 19:32:43.534308 kubelet[2010]: I0212 19:32:43.534222 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5aafbe19-2342-4996-98fb-f7d7318950aa-var-lib-calico\") pod \"tigera-operator-7ff8dc855-qbk7s\" (UID: \"5aafbe19-2342-4996-98fb-f7d7318950aa\") " pod="tigera-operator/tigera-operator-7ff8dc855-qbk7s" Feb 12 19:32:43.591525 kubelet[2010]: E0212 19:32:43.591482 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:43.592213 env[1123]: time="2024-02-12T19:32:43.592156613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hwxp5,Uid:31fee376-a49d-47a5-8601-466ba75354ee,Namespace:kube-system,Attempt:0,}" Feb 12 19:32:43.604049 env[1123]: time="2024-02-12T19:32:43.603991358Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:43.604049 env[1123]: time="2024-02-12T19:32:43.604031294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:43.604049 env[1123]: time="2024-02-12T19:32:43.604041553Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:43.604223 env[1123]: time="2024-02-12T19:32:43.604166239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c38c23b4124fcca5caaa2b32a458c997c57187d7ea44363487592859951796f pid=2123 runtime=io.containerd.runc.v2 Feb 12 19:32:43.616550 systemd[1]: Started cri-containerd-6c38c23b4124fcca5caaa2b32a458c997c57187d7ea44363487592859951796f.scope. Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.625000 audit: BPF prog-id=112 op=LOAD Feb 12 19:32:43.625000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.625000 audit[2133]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2123 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333863323362343132346663636135636161613262333261343538 Feb 12 19:32:43.625000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.625000 audit[2133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2123 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333863323362343132346663636135636161613262333261343538 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit: BPF prog-id=113 op=LOAD Feb 12 19:32:43.626000 audit[2133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d6ab0 items=0 ppid=2123 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333863323362343132346663636135636161613262333261343538 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.626000 audit: BPF prog-id=114 op=LOAD Feb 12 19:32:43.626000 audit[2133]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d6af8 items=0 ppid=2123 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333863323362343132346663636135636161613262333261343538 Feb 12 19:32:43.627000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:32:43.627000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { perfmon } for pid=2133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit[2133]: AVC avc: denied { bpf } for pid=2133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.627000 audit: BPF prog-id=115 op=LOAD Feb 12 19:32:43.627000 audit[2133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d6f08 items=0 ppid=2123 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333863323362343132346663636135636161613262333261343538 Feb 12 19:32:43.642727 env[1123]: time="2024-02-12T19:32:43.642679000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hwxp5,Uid:31fee376-a49d-47a5-8601-466ba75354ee,Namespace:kube-system,Attempt:0,} returns sandbox id \"6c38c23b4124fcca5caaa2b32a458c997c57187d7ea44363487592859951796f\"" Feb 12 19:32:43.643339 kubelet[2010]: E0212 19:32:43.643309 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:43.646364 env[1123]: time="2024-02-12T19:32:43.646084537Z" level=info msg="CreateContainer within sandbox \"6c38c23b4124fcca5caaa2b32a458c997c57187d7ea44363487592859951796f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:32:43.659928 env[1123]: time="2024-02-12T19:32:43.659883782Z" level=info msg="CreateContainer within sandbox \"6c38c23b4124fcca5caaa2b32a458c997c57187d7ea44363487592859951796f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a9c9951062156604b288b0abe5dd79c694bed3970886bf9b6530d39588502f8a\"" Feb 12 19:32:43.660375 env[1123]: time="2024-02-12T19:32:43.660346637Z" level=info msg="StartContainer for \"a9c9951062156604b288b0abe5dd79c694bed3970886bf9b6530d39588502f8a\"" Feb 12 19:32:43.674352 systemd[1]: Started cri-containerd-a9c9951062156604b288b0abe5dd79c694bed3970886bf9b6530d39588502f8a.scope. Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3e32546fc8 items=0 ppid=2123 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633939353130363231353636303462323838623061626535646437 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit: BPF prog-id=116 op=LOAD Feb 12 19:32:43.687000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000231778 items=0 ppid=2123 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633939353130363231353636303462323838623061626535646437 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit: BPF prog-id=117 op=LOAD Feb 12 19:32:43.687000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002317c8 items=0 ppid=2123 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633939353130363231353636303462323838623061626535646437 Feb 12 19:32:43.687000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:32:43.687000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.687000 audit: BPF prog-id=118 op=LOAD Feb 12 19:32:43.687000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000231858 items=0 ppid=2123 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633939353130363231353636303462323838623061626535646437 Feb 12 19:32:43.701691 env[1123]: time="2024-02-12T19:32:43.701631436Z" level=info msg="StartContainer for \"a9c9951062156604b288b0abe5dd79c694bed3970886bf9b6530d39588502f8a\" returns successfully" Feb 12 19:32:43.748000 audit[2213]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.748000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6c5471c0 a2=0 a3=7ffe6c5471ac items=0 ppid=2174 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:32:43.749000 audit[2214]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.749000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd46d4d2d0 a2=0 a3=7ffd46d4d2bc items=0 ppid=2174 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:32:43.749000 audit[2215]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.749000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7d09d540 a2=0 a3=7ffe7d09d52c items=0 ppid=2174 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:32:43.750000 audit[2216]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.750000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedae9c590 a2=0 a3=7ffedae9c57c items=0 ppid=2174 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:32:43.751789 env[1123]: time="2024-02-12T19:32:43.751747954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-qbk7s,Uid:5aafbe19-2342-4996-98fb-f7d7318950aa,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:32:43.753000 audit[2218]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.753000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb5302590 a2=0 a3=7ffcb530257c items=0 ppid=2174 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:32:43.753000 audit[2217]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.753000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff15cad3d0 a2=0 a3=7fff15cad3bc items=0 ppid=2174 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:32:43.766315 env[1123]: time="2024-02-12T19:32:43.766233016Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:43.766315 env[1123]: time="2024-02-12T19:32:43.766295956Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:43.766408 env[1123]: time="2024-02-12T19:32:43.766311705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:43.766570 env[1123]: time="2024-02-12T19:32:43.766539236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9df82925315d716d8b29ca5c793dc43353a48554677ce9d42842644c53302e96 pid=2227 runtime=io.containerd.runc.v2 Feb 12 19:32:43.777032 systemd[1]: Started cri-containerd-9df82925315d716d8b29ca5c793dc43353a48554677ce9d42842644c53302e96.scope. Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.787000 audit: BPF prog-id=119 op=LOAD Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2227 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663832393235333135643731366438623239636135633739336463 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2227 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663832393235333135643731366438623239636135633739336463 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.789000 audit: BPF prog-id=120 op=LOAD Feb 12 19:32:43.789000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00035c8d0 items=0 ppid=2227 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663832393235333135643731366438623239636135633739336463 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.790000 audit: BPF prog-id=121 op=LOAD Feb 12 19:32:43.790000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00035c918 items=0 ppid=2227 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663832393235333135643731366438623239636135633739336463 Feb 12 19:32:43.791000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:32:43.791000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:43.791000 audit: BPF prog-id=122 op=LOAD Feb 12 19:32:43.791000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00035cd28 items=0 ppid=2227 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663832393235333135643731366438623239636135633739336463 Feb 12 19:32:43.812770 env[1123]: time="2024-02-12T19:32:43.812720564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-qbk7s,Uid:5aafbe19-2342-4996-98fb-f7d7318950aa,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9df82925315d716d8b29ca5c793dc43353a48554677ce9d42842644c53302e96\"" Feb 12 19:32:43.814287 env[1123]: time="2024-02-12T19:32:43.814264467Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:32:43.856000 audit[2261]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.856000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0fc674f0 a2=0 a3=7ffd0fc674dc items=0 ppid=2174 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:32:43.858000 audit[2263]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.858000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff1111fc90 a2=0 a3=7fff1111fc7c items=0 ppid=2174 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:32:43.861000 audit[2266]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.861000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff23e2c1c0 a2=0 a3=7fff23e2c1ac items=0 ppid=2174 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:32:43.862000 audit[2267]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.862000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3f4e5ed0 a2=0 a3=7ffe3f4e5ebc items=0 ppid=2174 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:32:43.864000 audit[2269]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.864000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7c454860 a2=0 a3=7ffc7c45484c items=0 ppid=2174 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:32:43.865000 audit[2270]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.865000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe22af2f80 a2=0 a3=7ffe22af2f6c items=0 ppid=2174 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:32:43.867000 audit[2272]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.867000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe80bbd7b0 a2=0 a3=7ffe80bbd79c items=0 ppid=2174 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:32:43.869000 audit[2275]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.869000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff9fbf1080 a2=0 a3=7fff9fbf106c items=0 ppid=2174 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:32:43.870000 audit[2276]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.870000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6370e610 a2=0 a3=7ffd6370e5fc items=0 ppid=2174 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:32:43.872000 audit[2278]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.872000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf1a77400 a2=0 a3=7ffdf1a773ec items=0 ppid=2174 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:32:43.872000 audit[2279]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.872000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb6d64530 a2=0 a3=7ffdb6d6451c items=0 ppid=2174 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:32:43.874000 audit[2281]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.874000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeed7a5340 a2=0 a3=7ffeed7a532c items=0 ppid=2174 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:32:43.877000 audit[2284]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.877000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebadbdec0 a2=0 a3=7ffebadbdeac items=0 ppid=2174 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:32:43.880000 audit[2287]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.880000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda76d2220 a2=0 a3=7ffda76d220c items=0 ppid=2174 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:32:43.881000 audit[2288]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.881000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd51c86f0 a2=0 a3=7ffdd51c86dc items=0 ppid=2174 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:32:43.882000 audit[2290]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.882000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffd7aff6d0 a2=0 a3=7fffd7aff6bc items=0 ppid=2174 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:32:43.885000 audit[2293]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.885000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc01a82640 a2=0 a3=7ffc01a8262c items=0 ppid=2174 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:32:43.889000 audit[2298]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.889000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc92cb1820 a2=0 a3=7ffc92cb180c items=0 ppid=2174 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:32:43.891000 audit[2300]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:32:43.891000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffaedbe8d0 a2=0 a3=7fffaedbe8bc items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:32:43.899000 audit[2302]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:43.899000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff74a48240 a2=0 a3=7fff74a4822c items=0 ppid=2174 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:43.903000 audit[2302]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:43.903000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff74a48240 a2=0 a3=7fff74a4822c items=0 ppid=2174 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:43.906000 audit[2308]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.906000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff11a86d40 a2=0 a3=7fff11a86d2c items=0 ppid=2174 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:32:43.907000 audit[2310]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.907000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7c12e4f0 a2=0 a3=7ffc7c12e4dc items=0 ppid=2174 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:32:43.910000 audit[2313]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.910000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8dd0bfa0 a2=0 a3=7ffe8dd0bf8c items=0 ppid=2174 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:32:43.911000 audit[2314]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.911000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff44d9b0f0 a2=0 a3=7fff44d9b0dc items=0 ppid=2174 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:32:43.913000 audit[2316]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.913000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd97ad0de0 a2=0 a3=7ffd97ad0dcc items=0 ppid=2174 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:32:43.913000 audit[2317]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.913000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd35726970 a2=0 a3=7ffd3572695c items=0 ppid=2174 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:32:43.915000 audit[2319]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.915000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9a4f2a50 a2=0 a3=7ffe9a4f2a3c items=0 ppid=2174 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:32:43.918000 audit[2322]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.918000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffdf8f48a0 a2=0 a3=7fffdf8f488c items=0 ppid=2174 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:32:43.919000 audit[2323]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.919000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff16a9cec0 a2=0 a3=7fff16a9ceac items=0 ppid=2174 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:32:43.920000 audit[2325]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.920000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbc109cd0 a2=0 a3=7ffcbc109cbc items=0 ppid=2174 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:32:43.921000 audit[2326]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.921000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1eefd6c0 a2=0 a3=7ffd1eefd6ac items=0 ppid=2174 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:32:43.923000 audit[2328]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.923000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8ebf42f0 a2=0 a3=7ffe8ebf42dc items=0 ppid=2174 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:32:43.925000 audit[2331]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.925000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0d8d1b80 a2=0 a3=7ffd0d8d1b6c items=0 ppid=2174 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:32:43.928000 audit[2334]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.928000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0c978bd0 a2=0 a3=7ffc0c978bbc items=0 ppid=2174 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:32:43.929000 audit[2335]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.929000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa76fbd50 a2=0 a3=7fffa76fbd3c items=0 ppid=2174 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:32:43.930000 audit[2337]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.930000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc2c2f9fa0 a2=0 a3=7ffc2c2f9f8c items=0 ppid=2174 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:32:43.933000 audit[2340]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.933000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3b6d5150 a2=0 a3=7ffd3b6d513c items=0 ppid=2174 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:32:43.934000 audit[2341]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.934000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceee90af0 a2=0 a3=7ffceee90adc items=0 ppid=2174 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:32:43.935000 audit[2343]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.935000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5ebc7790 a2=0 a3=7ffd5ebc777c items=0 ppid=2174 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:32:43.938000 audit[2346]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.938000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbab9efb0 a2=0 a3=7ffdbab9ef9c items=0 ppid=2174 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:32:43.938000 audit[2347]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.938000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd18ebbf0 a2=0 a3=7ffcd18ebbdc items=0 ppid=2174 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:32:43.940000 audit[2349]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:32:43.940000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe632e87e0 a2=0 a3=7ffe632e87cc items=0 ppid=2174 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:32:43.942000 audit[2351]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:32:43.942000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc11005b80 a2=0 a3=7ffc11005b6c items=0 ppid=2174 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.942000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:43.943000 audit[2351]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:32:43.943000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc11005b80 a2=0 a3=7ffc11005b6c items=0 ppid=2174 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:43.943000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:43.975476 kubelet[2010]: E0212 19:32:43.975450 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:43.981279 kubelet[2010]: I0212 19:32:43.981248 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-hwxp5" podStartSLOduration=0.981212885 podCreationTimestamp="2024-02-12 19:32:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:32:43.980978441 +0000 UTC m=+14.112039628" watchObservedRunningTime="2024-02-12 19:32:43.981212885 +0000 UTC m=+14.112274082" Feb 12 19:32:44.447422 systemd[1]: run-containerd-runc-k8s.io-6c38c23b4124fcca5caaa2b32a458c997c57187d7ea44363487592859951796f-runc.6WmkpT.mount: Deactivated successfully. Feb 12 19:32:45.051882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3525444894.mount: Deactivated successfully. Feb 12 19:32:46.552886 env[1123]: time="2024-02-12T19:32:46.552840425Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:46.557864 env[1123]: time="2024-02-12T19:32:46.557831749Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:46.559420 env[1123]: time="2024-02-12T19:32:46.559378151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:46.560991 env[1123]: time="2024-02-12T19:32:46.560970311Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:46.561945 env[1123]: time="2024-02-12T19:32:46.561918523Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 19:32:46.563327 env[1123]: time="2024-02-12T19:32:46.563300986Z" level=info msg="CreateContainer within sandbox \"9df82925315d716d8b29ca5c793dc43353a48554677ce9d42842644c53302e96\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:32:46.576234 env[1123]: time="2024-02-12T19:32:46.576179586Z" level=info msg="CreateContainer within sandbox \"9df82925315d716d8b29ca5c793dc43353a48554677ce9d42842644c53302e96\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2d6417dce7d1b023dcbbb2c809d1b8e125000f3e38b68f87f215c60190b8f272\"" Feb 12 19:32:46.576713 env[1123]: time="2024-02-12T19:32:46.576664662Z" level=info msg="StartContainer for \"2d6417dce7d1b023dcbbb2c809d1b8e125000f3e38b68f87f215c60190b8f272\"" Feb 12 19:32:46.592900 systemd[1]: run-containerd-runc-k8s.io-2d6417dce7d1b023dcbbb2c809d1b8e125000f3e38b68f87f215c60190b8f272-runc.t1wdJN.mount: Deactivated successfully. Feb 12 19:32:46.594454 systemd[1]: Started cri-containerd-2d6417dce7d1b023dcbbb2c809d1b8e125000f3e38b68f87f215c60190b8f272.scope. Feb 12 19:32:46.608700 kernel: kauditd_printk_skb: 315 callbacks suppressed Feb 12 19:32:46.608781 kernel: audit: type=1400 audit(1707766366.604:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.608804 kernel: audit: type=1400 audit(1707766366.604:1054): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.609601 kernel: audit: type=1400 audit(1707766366.604:1055): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.611526 kernel: audit: type=1400 audit(1707766366.604:1056): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.615411 kernel: audit: type=1400 audit(1707766366.604:1057): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.615470 kernel: audit: type=1400 audit(1707766366.604:1058): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.617365 kernel: audit: type=1400 audit(1707766366.604:1059): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.619316 kernel: audit: type=1400 audit(1707766366.604:1060): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.623288 kernel: audit: type=1400 audit(1707766366.604:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.623333 kernel: audit: type=1400 audit(1707766366.606:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit: BPF prog-id=123 op=LOAD Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2227 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:46.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363431376463653764316230323364636262623263383039643162 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2227 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:46.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363431376463653764316230323364636262623263383039643162 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.607000 audit: BPF prog-id=124 op=LOAD Feb 12 19:32:46.607000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000328380 items=0 ppid=2227 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:46.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363431376463653764316230323364636262623263383039643162 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.610000 audit: BPF prog-id=125 op=LOAD Feb 12 19:32:46.610000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003283c8 items=0 ppid=2227 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:46.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363431376463653764316230323364636262623263383039643162 Feb 12 19:32:46.614000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:32:46.614000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:46.614000 audit: BPF prog-id=126 op=LOAD Feb 12 19:32:46.614000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003287d8 items=0 ppid=2227 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:46.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363431376463653764316230323364636262623263383039643162 Feb 12 19:32:46.635613 env[1123]: time="2024-02-12T19:32:46.635564631Z" level=info msg="StartContainer for \"2d6417dce7d1b023dcbbb2c809d1b8e125000f3e38b68f87f215c60190b8f272\" returns successfully" Feb 12 19:32:48.372000 audit[2393]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:48.372000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd36a1e140 a2=0 a3=7ffd36a1e12c items=0 ppid=2174 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:48.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:48.373000 audit[2393]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:48.373000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd36a1e140 a2=0 a3=31030 items=0 ppid=2174 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:48.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:48.385000 audit[2395]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:48.385000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe7bf792a0 a2=0 a3=7ffe7bf7928c items=0 ppid=2174 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:48.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:48.389000 audit[2395]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:48.389000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe7bf792a0 a2=0 a3=31030 items=0 ppid=2174 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:48.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:48.493357 kubelet[2010]: I0212 19:32:48.493313 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-qbk7s" podStartSLOduration=2.744922064 podCreationTimestamp="2024-02-12 19:32:43 +0000 UTC" firstStartedPulling="2024-02-12 19:32:43.813799196 +0000 UTC m=+13.944860383" lastFinishedPulling="2024-02-12 19:32:46.562142316 +0000 UTC m=+16.693203503" observedRunningTime="2024-02-12 19:32:46.987500383 +0000 UTC m=+17.118561570" watchObservedRunningTime="2024-02-12 19:32:48.493265184 +0000 UTC m=+18.624326371" Feb 12 19:32:48.493774 kubelet[2010]: I0212 19:32:48.493463 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:48.499377 systemd[1]: Created slice kubepods-besteffort-pod44071c1f_27ea_46ec_ad0e_e239b0e7feb5.slice. Feb 12 19:32:48.535732 kubelet[2010]: I0212 19:32:48.535690 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:48.541439 systemd[1]: Created slice kubepods-besteffort-pod0af2b901_0fdb_4952_a984_1baabfb15806.slice. Feb 12 19:32:48.564423 kubelet[2010]: I0212 19:32:48.564382 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-policysync\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.564662 kubelet[2010]: I0212 19:32:48.564634 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jwptz\" (UniqueName: \"kubernetes.io/projected/0af2b901-0fdb-4952-a984-1baabfb15806-kube-api-access-jwptz\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.564796 kubelet[2010]: I0212 19:32:48.564781 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-var-lib-calico\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.564901 kubelet[2010]: I0212 19:32:48.564887 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-flexvol-driver-host\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.565012 kubelet[2010]: I0212 19:32:48.564997 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/44071c1f-27ea-46ec-ad0e-e239b0e7feb5-typha-certs\") pod \"calico-typha-5dbbcf5c46-pt7qh\" (UID: \"44071c1f-27ea-46ec-ad0e-e239b0e7feb5\") " pod="calico-system/calico-typha-5dbbcf5c46-pt7qh" Feb 12 19:32:48.565111 kubelet[2010]: I0212 19:32:48.565096 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-lib-modules\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.565221 kubelet[2010]: I0212 19:32:48.565206 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-cni-log-dir\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.565325 kubelet[2010]: I0212 19:32:48.565309 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-xtables-lock\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.565564 kubelet[2010]: I0212 19:32:48.565549 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-var-run-calico\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.565686 kubelet[2010]: I0212 19:32:48.565657 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/44071c1f-27ea-46ec-ad0e-e239b0e7feb5-tigera-ca-bundle\") pod \"calico-typha-5dbbcf5c46-pt7qh\" (UID: \"44071c1f-27ea-46ec-ad0e-e239b0e7feb5\") " pod="calico-system/calico-typha-5dbbcf5c46-pt7qh" Feb 12 19:32:48.565797 kubelet[2010]: I0212 19:32:48.565781 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0af2b901-0fdb-4952-a984-1baabfb15806-node-certs\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.565906 kubelet[2010]: I0212 19:32:48.565891 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-cni-bin-dir\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.566012 kubelet[2010]: I0212 19:32:48.565997 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0af2b901-0fdb-4952-a984-1baabfb15806-cni-net-dir\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.566121 kubelet[2010]: I0212 19:32:48.566106 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6njwl\" (UniqueName: \"kubernetes.io/projected/44071c1f-27ea-46ec-ad0e-e239b0e7feb5-kube-api-access-6njwl\") pod \"calico-typha-5dbbcf5c46-pt7qh\" (UID: \"44071c1f-27ea-46ec-ad0e-e239b0e7feb5\") " pod="calico-system/calico-typha-5dbbcf5c46-pt7qh" Feb 12 19:32:48.566233 kubelet[2010]: I0212 19:32:48.566219 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0af2b901-0fdb-4952-a984-1baabfb15806-tigera-ca-bundle\") pod \"calico-node-p75f2\" (UID: \"0af2b901-0fdb-4952-a984-1baabfb15806\") " pod="calico-system/calico-node-p75f2" Feb 12 19:32:48.638634 kubelet[2010]: I0212 19:32:48.638512 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:32:48.638838 kubelet[2010]: E0212 19:32:48.638808 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:48.667787 kubelet[2010]: I0212 19:32:48.667761 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9a7c17c9-efe7-4057-8573-954bb191e1a8-socket-dir\") pod \"csi-node-driver-r7lmb\" (UID: \"9a7c17c9-efe7-4057-8573-954bb191e1a8\") " pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:32:48.668043 kubelet[2010]: I0212 19:32:48.668019 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9a7c17c9-efe7-4057-8573-954bb191e1a8-kubelet-dir\") pod \"csi-node-driver-r7lmb\" (UID: \"9a7c17c9-efe7-4057-8573-954bb191e1a8\") " pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:32:48.668206 kubelet[2010]: I0212 19:32:48.668194 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9a7c17c9-efe7-4057-8573-954bb191e1a8-registration-dir\") pod \"csi-node-driver-r7lmb\" (UID: \"9a7c17c9-efe7-4057-8573-954bb191e1a8\") " pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:32:48.668963 kubelet[2010]: I0212 19:32:48.668948 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xckbr\" (UniqueName: \"kubernetes.io/projected/9a7c17c9-efe7-4057-8573-954bb191e1a8-kube-api-access-xckbr\") pod \"csi-node-driver-r7lmb\" (UID: \"9a7c17c9-efe7-4057-8573-954bb191e1a8\") " pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:32:48.669108 kubelet[2010]: I0212 19:32:48.669096 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9a7c17c9-efe7-4057-8573-954bb191e1a8-varrun\") pod \"csi-node-driver-r7lmb\" (UID: \"9a7c17c9-efe7-4057-8573-954bb191e1a8\") " pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:32:48.673289 kubelet[2010]: E0212 19:32:48.673262 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.673289 kubelet[2010]: W0212 19:32:48.673276 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.673289 kubelet[2010]: E0212 19:32:48.673295 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.677591 kubelet[2010]: E0212 19:32:48.677558 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.677591 kubelet[2010]: W0212 19:32:48.677581 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.677749 kubelet[2010]: E0212 19:32:48.677618 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.687216 kubelet[2010]: E0212 19:32:48.687180 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.687216 kubelet[2010]: W0212 19:32:48.687204 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.687362 kubelet[2010]: E0212 19:32:48.687226 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.690391 kubelet[2010]: E0212 19:32:48.690349 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.690391 kubelet[2010]: W0212 19:32:48.690359 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.690391 kubelet[2010]: E0212 19:32:48.690373 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.770121 kubelet[2010]: E0212 19:32:48.770086 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.770121 kubelet[2010]: W0212 19:32:48.770111 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.770121 kubelet[2010]: E0212 19:32:48.770131 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.770370 kubelet[2010]: E0212 19:32:48.770353 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.770370 kubelet[2010]: W0212 19:32:48.770364 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.770446 kubelet[2010]: E0212 19:32:48.770378 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.770642 kubelet[2010]: E0212 19:32:48.770601 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.770642 kubelet[2010]: W0212 19:32:48.770621 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.770642 kubelet[2010]: E0212 19:32:48.770653 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.770886 kubelet[2010]: E0212 19:32:48.770872 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.770886 kubelet[2010]: W0212 19:32:48.770881 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.770972 kubelet[2010]: E0212 19:32:48.770893 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.771097 kubelet[2010]: E0212 19:32:48.771072 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.771097 kubelet[2010]: W0212 19:32:48.771083 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.771097 kubelet[2010]: E0212 19:32:48.771098 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.771316 kubelet[2010]: E0212 19:32:48.771298 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.771515 kubelet[2010]: W0212 19:32:48.771494 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.771612 kubelet[2010]: E0212 19:32:48.771587 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.771804 kubelet[2010]: E0212 19:32:48.771788 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.771804 kubelet[2010]: W0212 19:32:48.771800 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.771894 kubelet[2010]: E0212 19:32:48.771840 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.772008 kubelet[2010]: E0212 19:32:48.771985 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.772008 kubelet[2010]: W0212 19:32:48.771994 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.772100 kubelet[2010]: E0212 19:32:48.772034 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.772174 kubelet[2010]: E0212 19:32:48.772159 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.772174 kubelet[2010]: W0212 19:32:48.772168 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.772269 kubelet[2010]: E0212 19:32:48.772200 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.772329 kubelet[2010]: E0212 19:32:48.772315 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.772329 kubelet[2010]: W0212 19:32:48.772324 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.772399 kubelet[2010]: E0212 19:32:48.772348 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.772566 kubelet[2010]: E0212 19:32:48.772550 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.772566 kubelet[2010]: W0212 19:32:48.772559 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.772651 kubelet[2010]: E0212 19:32:48.772601 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.772741 kubelet[2010]: E0212 19:32:48.772725 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.772741 kubelet[2010]: W0212 19:32:48.772735 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.772835 kubelet[2010]: E0212 19:32:48.772749 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.772916 kubelet[2010]: E0212 19:32:48.772899 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.772916 kubelet[2010]: W0212 19:32:48.772909 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.773011 kubelet[2010]: E0212 19:32:48.772923 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.773111 kubelet[2010]: E0212 19:32:48.773099 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.773111 kubelet[2010]: W0212 19:32:48.773108 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.773195 kubelet[2010]: E0212 19:32:48.773122 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.773302 kubelet[2010]: E0212 19:32:48.773288 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.773302 kubelet[2010]: W0212 19:32:48.773297 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.773370 kubelet[2010]: E0212 19:32:48.773309 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.773500 kubelet[2010]: E0212 19:32:48.773487 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.773500 kubelet[2010]: W0212 19:32:48.773495 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.773567 kubelet[2010]: E0212 19:32:48.773506 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.773699 kubelet[2010]: E0212 19:32:48.773687 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.773699 kubelet[2010]: W0212 19:32:48.773695 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.773775 kubelet[2010]: E0212 19:32:48.773726 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.773856 kubelet[2010]: E0212 19:32:48.773844 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.773856 kubelet[2010]: W0212 19:32:48.773854 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.773943 kubelet[2010]: E0212 19:32:48.773917 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.774053 kubelet[2010]: E0212 19:32:48.774038 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.774053 kubelet[2010]: W0212 19:32:48.774047 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.774135 kubelet[2010]: E0212 19:32:48.774076 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.774222 kubelet[2010]: E0212 19:32:48.774208 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.774222 kubelet[2010]: W0212 19:32:48.774218 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.774309 kubelet[2010]: E0212 19:32:48.774232 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.774362 kubelet[2010]: E0212 19:32:48.774349 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.774362 kubelet[2010]: W0212 19:32:48.774358 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.774434 kubelet[2010]: E0212 19:32:48.774371 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.774541 kubelet[2010]: E0212 19:32:48.774526 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.774541 kubelet[2010]: W0212 19:32:48.774534 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.774627 kubelet[2010]: E0212 19:32:48.774548 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.774741 kubelet[2010]: E0212 19:32:48.774727 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.774741 kubelet[2010]: W0212 19:32:48.774737 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.774831 kubelet[2010]: E0212 19:32:48.774751 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.774966 kubelet[2010]: E0212 19:32:48.774950 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.774966 kubelet[2010]: W0212 19:32:48.774964 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.775049 kubelet[2010]: E0212 19:32:48.774979 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.775184 kubelet[2010]: E0212 19:32:48.775171 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.775184 kubelet[2010]: W0212 19:32:48.775181 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.775287 kubelet[2010]: E0212 19:32:48.775191 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.781906 kubelet[2010]: E0212 19:32:48.781885 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:32:48.781906 kubelet[2010]: W0212 19:32:48.781898 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:32:48.781906 kubelet[2010]: E0212 19:32:48.781908 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:32:48.803709 kubelet[2010]: E0212 19:32:48.803649 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:48.804465 env[1123]: time="2024-02-12T19:32:48.804401244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5dbbcf5c46-pt7qh,Uid:44071c1f-27ea-46ec-ad0e-e239b0e7feb5,Namespace:calico-system,Attempt:0,}" Feb 12 19:32:48.844178 kubelet[2010]: E0212 19:32:48.844143 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:48.844794 env[1123]: time="2024-02-12T19:32:48.844748354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p75f2,Uid:0af2b901-0fdb-4952-a984-1baabfb15806,Namespace:calico-system,Attempt:0,}" Feb 12 19:32:49.006018 env[1123]: time="2024-02-12T19:32:49.005854822Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:49.006018 env[1123]: time="2024-02-12T19:32:49.005892564Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:49.006018 env[1123]: time="2024-02-12T19:32:49.005901571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:49.006225 env[1123]: time="2024-02-12T19:32:49.006174836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975 pid=2441 runtime=io.containerd.runc.v2 Feb 12 19:32:49.007136 env[1123]: time="2024-02-12T19:32:49.007063093Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:32:49.007136 env[1123]: time="2024-02-12T19:32:49.007111514Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:32:49.007136 env[1123]: time="2024-02-12T19:32:49.007122435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:32:49.007377 env[1123]: time="2024-02-12T19:32:49.007293107Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47c0c544fca4e1ce5553841d701f3a913e80c88ad59be795564f31e61ad94723 pid=2450 runtime=io.containerd.runc.v2 Feb 12 19:32:49.018862 systemd[1]: Started cri-containerd-67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975.scope. Feb 12 19:32:49.029653 systemd[1]: Started cri-containerd-47c0c544fca4e1ce5553841d701f3a913e80c88ad59be795564f31e61ad94723.scope. Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.031000 audit: BPF prog-id=127 op=LOAD Feb 12 19:32:49.032000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.032000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2441 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637623164633030646636383438653330356266613561386339373636 Feb 12 19:32:49.032000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.032000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2441 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637623164633030646636383438653330356266613561386339373636 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.033000 audit: BPF prog-id=128 op=LOAD Feb 12 19:32:49.033000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000340040 items=0 ppid=2441 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637623164633030646636383438653330356266613561386339373636 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit: BPF prog-id=129 op=LOAD Feb 12 19:32:49.034000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000340088 items=0 ppid=2441 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637623164633030646636383438653330356266613561386339373636 Feb 12 19:32:49.034000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:32:49.034000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.034000 audit: BPF prog-id=130 op=LOAD Feb 12 19:32:49.034000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000340498 items=0 ppid=2441 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637623164633030646636383438653330356266613561386339373636 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.038000 audit: BPF prog-id=131 op=LOAD Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2450 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633063353434666361346531636535353533383431643730316633 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2450 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633063353434666361346531636535353533383431643730316633 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit: BPF prog-id=132 op=LOAD Feb 12 19:32:49.039000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002227e0 items=0 ppid=2450 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633063353434666361346531636535353533383431643730316633 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit: BPF prog-id=133 op=LOAD Feb 12 19:32:49.039000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000222828 items=0 ppid=2450 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633063353434666361346531636535353533383431643730316633 Feb 12 19:32:49.039000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:32:49.039000 audit: BPF prog-id=132 op=UNLOAD Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:49.039000 audit: BPF prog-id=134 op=LOAD Feb 12 19:32:49.039000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000222c38 items=0 ppid=2450 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633063353434666361346531636535353533383431643730316633 Feb 12 19:32:49.057787 env[1123]: time="2024-02-12T19:32:49.057746399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p75f2,Uid:0af2b901-0fdb-4952-a984-1baabfb15806,Namespace:calico-system,Attempt:0,} returns sandbox id \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\"" Feb 12 19:32:49.059039 kubelet[2010]: E0212 19:32:49.058631 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:49.060717 env[1123]: time="2024-02-12T19:32:49.060532637Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:32:49.069602 env[1123]: time="2024-02-12T19:32:49.069554094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5dbbcf5c46-pt7qh,Uid:44071c1f-27ea-46ec-ad0e-e239b0e7feb5,Namespace:calico-system,Attempt:0,} returns sandbox id \"47c0c544fca4e1ce5553841d701f3a913e80c88ad59be795564f31e61ad94723\"" Feb 12 19:32:49.070461 kubelet[2010]: E0212 19:32:49.070174 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:49.402000 audit[2513]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:49.402000 audit[2513]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffeb8b0e880 a2=0 a3=7ffeb8b0e86c items=0 ppid=2174 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:49.402000 audit[2513]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:32:49.402000 audit[2513]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffeb8b0e880 a2=0 a3=31030 items=0 ppid=2174 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:49.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:32:49.951114 kubelet[2010]: E0212 19:32:49.951077 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:51.950523 kubelet[2010]: E0212 19:32:51.950476 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:52.404363 env[1123]: time="2024-02-12T19:32:52.404254769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:52.406200 env[1123]: time="2024-02-12T19:32:52.406171432Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:52.408335 env[1123]: time="2024-02-12T19:32:52.408294224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:52.410856 env[1123]: time="2024-02-12T19:32:52.410828080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:52.411588 env[1123]: time="2024-02-12T19:32:52.411563848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:32:52.412452 env[1123]: time="2024-02-12T19:32:52.412428097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:32:52.413130 env[1123]: time="2024-02-12T19:32:52.413106566Z" level=info msg="CreateContainer within sandbox \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:32:52.424537 env[1123]: time="2024-02-12T19:32:52.424489995Z" level=info msg="CreateContainer within sandbox \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1\"" Feb 12 19:32:52.424934 env[1123]: time="2024-02-12T19:32:52.424911921Z" level=info msg="StartContainer for \"0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1\"" Feb 12 19:32:52.442321 systemd[1]: Started cri-containerd-0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1.scope. Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.466547 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 19:32:52.466699 kernel: audit: type=1400 audit(1707766372.453:1113): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.466725 kernel: audit: type=1300 audit(1707766372.453:1113): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f30be7db348 items=0 ppid=2441 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:52.466744 kernel: audit: type=1327 audit(1707766372.453:1113): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303136353866393230393037376262363161643262326664323164 Feb 12 19:32:52.466767 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.466784 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f30be7db348 items=0 ppid=2441 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:52.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303136353866393230393037376262363161643262326664323164 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.471364 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.471428 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.471450 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.477976 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.478063 kernel: audit: type=1400 audit(1707766372.453:1114): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.453000 audit: BPF prog-id=135 op=LOAD Feb 12 19:32:52.453000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00033dee8 items=0 ppid=2441 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:52.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303136353866393230393037376262363161643262326664323164 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.455000 audit: BPF prog-id=136 op=LOAD Feb 12 19:32:52.455000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00033df38 items=0 ppid=2441 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:52.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303136353866393230393037376262363161643262326664323164 Feb 12 19:32:52.458000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:32:52.458000 audit: BPF prog-id=135 op=UNLOAD Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:52.458000 audit: BPF prog-id=137 op=LOAD Feb 12 19:32:52.458000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00033dfc8 items=0 ppid=2441 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:52.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303136353866393230393037376262363161643262326664323164 Feb 12 19:32:52.489061 env[1123]: time="2024-02-12T19:32:52.488999837Z" level=info msg="StartContainer for \"0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1\" returns successfully" Feb 12 19:32:52.492517 systemd[1]: cri-containerd-0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1.scope: Deactivated successfully. Feb 12 19:32:52.495000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:32:52.522089 env[1123]: time="2024-02-12T19:32:52.522033009Z" level=info msg="shim disconnected" id=0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1 Feb 12 19:32:52.522089 env[1123]: time="2024-02-12T19:32:52.522084806Z" level=warning msg="cleaning up after shim disconnected" id=0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1 namespace=k8s.io Feb 12 19:32:52.522089 env[1123]: time="2024-02-12T19:32:52.522094775Z" level=info msg="cleaning up dead shim" Feb 12 19:32:52.528102 env[1123]: time="2024-02-12T19:32:52.528067375Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:32:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2559 runtime=io.containerd.runc.v2\n" Feb 12 19:32:52.991777 kubelet[2010]: E0212 19:32:52.991741 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:53.420584 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0501658f9209077bb61ad2b2fd21dbce50cfacabcbbe0af7a7ef5c7d36405fa1-rootfs.mount: Deactivated successfully. Feb 12 19:32:53.950777 kubelet[2010]: E0212 19:32:53.950736 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:54.406239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3407296197.mount: Deactivated successfully. Feb 12 19:32:55.950373 kubelet[2010]: E0212 19:32:55.950345 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:57.687684 env[1123]: time="2024-02-12T19:32:57.687615747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:57.689917 env[1123]: time="2024-02-12T19:32:57.689866193Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:57.704063 env[1123]: time="2024-02-12T19:32:57.704025125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:57.706288 env[1123]: time="2024-02-12T19:32:57.706262447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:32:57.706978 env[1123]: time="2024-02-12T19:32:57.706930585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 19:32:57.707578 env[1123]: time="2024-02-12T19:32:57.707526085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:32:57.713271 env[1123]: time="2024-02-12T19:32:57.712913727Z" level=info msg="CreateContainer within sandbox \"47c0c544fca4e1ce5553841d701f3a913e80c88ad59be795564f31e61ad94723\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:32:57.765953 env[1123]: time="2024-02-12T19:32:57.765912038Z" level=info msg="CreateContainer within sandbox \"47c0c544fca4e1ce5553841d701f3a913e80c88ad59be795564f31e61ad94723\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"280d4305f80564657314b30a96b63ab606b4afff36240d2db4f3566266e5b211\"" Feb 12 19:32:57.766303 env[1123]: time="2024-02-12T19:32:57.766283578Z" level=info msg="StartContainer for \"280d4305f80564657314b30a96b63ab606b4afff36240d2db4f3566266e5b211\"" Feb 12 19:32:57.779321 systemd[1]: Started cri-containerd-280d4305f80564657314b30a96b63ab606b4afff36240d2db4f3566266e5b211.scope. Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.792076 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:32:57.792139 kernel: audit: type=1400 audit(1707766377.790:1120): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.795897 kernel: audit: type=1400 audit(1707766377.790:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797897 kernel: audit: type=1400 audit(1707766377.790:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.798699 kernel: audit: type=1400 audit(1707766377.790:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.803123 kernel: audit: type=1400 audit(1707766377.790:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.803176 kernel: audit: type=1400 audit(1707766377.790:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.805218 kernel: audit: type=1400 audit(1707766377.790:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.807397 kernel: audit: type=1400 audit(1707766377.790:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.809567 kernel: audit: type=1400 audit(1707766377.790:1128): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.811564 kernel: audit: type=1400 audit(1707766377.790:1129): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.790000 audit: BPF prog-id=138 op=LOAD Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2450 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:57.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306434333035663830353634363537333134623330613936623633 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2450 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:57.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306434333035663830353634363537333134623330613936623633 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit: BPF prog-id=139 op=LOAD Feb 12 19:32:57.791000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021ba70 items=0 ppid=2450 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:57.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306434333035663830353634363537333134623330613936623633 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.791000 audit: BPF prog-id=140 op=LOAD Feb 12 19:32:57.791000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021bab8 items=0 ppid=2450 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:57.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306434333035663830353634363537333134623330613936623633 Feb 12 19:32:57.797000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:32:57.797000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:32:57.797000 audit: BPF prog-id=141 op=LOAD Feb 12 19:32:57.797000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021bec8 items=0 ppid=2450 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:57.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238306434333035663830353634363537333134623330613936623633 Feb 12 19:32:57.825197 env[1123]: time="2024-02-12T19:32:57.825152160Z" level=info msg="StartContainer for \"280d4305f80564657314b30a96b63ab606b4afff36240d2db4f3566266e5b211\" returns successfully" Feb 12 19:32:57.951083 kubelet[2010]: E0212 19:32:57.950977 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:58.009923 kubelet[2010]: E0212 19:32:58.009890 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:58.019016 kubelet[2010]: I0212 19:32:58.018977 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5dbbcf5c46-pt7qh" podStartSLOduration=1.382610425 podCreationTimestamp="2024-02-12 19:32:48 +0000 UTC" firstStartedPulling="2024-02-12 19:32:49.070941993 +0000 UTC m=+19.202003180" lastFinishedPulling="2024-02-12 19:32:57.707272458 +0000 UTC m=+27.838333645" observedRunningTime="2024-02-12 19:32:58.017550643 +0000 UTC m=+28.148611820" watchObservedRunningTime="2024-02-12 19:32:58.01894089 +0000 UTC m=+28.150002077" Feb 12 19:32:59.011240 kubelet[2010]: I0212 19:32:59.011195 2010 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:32:59.011759 kubelet[2010]: E0212 19:32:59.011736 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:32:59.809507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount644117816.mount: Deactivated successfully. Feb 12 19:32:59.951444 kubelet[2010]: E0212 19:32:59.951402 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:32:59.955020 systemd[1]: Started sshd@7-10.0.0.23:22-10.0.0.1:59866.service. Feb 12 19:32:59.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.23:22-10.0.0.1:59866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:32:59.988000 audit[2620]: USER_ACCT pid=2620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:32:59.989185 sshd[2620]: Accepted publickey for core from 10.0.0.1 port 59866 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:32:59.989000 audit[2620]: CRED_ACQ pid=2620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:32:59.989000 audit[2620]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27abf610 a2=3 a3=0 items=0 ppid=1 pid=2620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:32:59.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:32:59.990139 sshd[2620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:32:59.995247 systemd-logind[1112]: New session 8 of user core. Feb 12 19:32:59.995419 systemd[1]: Started session-8.scope. Feb 12 19:33:00.000000 audit[2620]: USER_START pid=2620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:00.001000 audit[2622]: CRED_ACQ pid=2622 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:00.136840 sshd[2620]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:00.137000 audit[2620]: USER_END pid=2620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:00.137000 audit[2620]: CRED_DISP pid=2620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:00.138838 systemd[1]: sshd@7-10.0.0.23:22-10.0.0.1:59866.service: Deactivated successfully. Feb 12 19:33:00.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.23:22-10.0.0.1:59866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:00.139496 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:33:00.139973 systemd-logind[1112]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:33:00.140540 systemd-logind[1112]: Removed session 8. Feb 12 19:33:01.950463 kubelet[2010]: E0212 19:33:01.950339 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:33:03.951001 kubelet[2010]: E0212 19:33:03.950607 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:33:05.140505 systemd[1]: Started sshd@8-10.0.0.23:22-10.0.0.1:59872.service. Feb 12 19:33:05.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.23:22-10.0.0.1:59872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:05.141276 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 12 19:33:05.141381 kernel: audit: type=1130 audit(1707766385.139:1147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.23:22-10.0.0.1:59872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:05.567000 audit[2636]: USER_ACCT pid=2636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.568305 sshd[2636]: Accepted publickey for core from 10.0.0.1 port 59872 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:05.570000 audit[2636]: CRED_ACQ pid=2636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.571601 sshd[2636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:05.573685 kernel: audit: type=1101 audit(1707766385.567:1148): pid=2636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.573732 kernel: audit: type=1103 audit(1707766385.570:1149): pid=2636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.573831 kernel: audit: type=1006 audit(1707766385.570:1150): pid=2636 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 19:33:05.574875 systemd-logind[1112]: New session 9 of user core. Feb 12 19:33:05.575332 kernel: audit: type=1300 audit(1707766385.570:1150): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcd3e7430 a2=3 a3=0 items=0 ppid=1 pid=2636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:05.570000 audit[2636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcd3e7430 a2=3 a3=0 items=0 ppid=1 pid=2636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:05.575622 systemd[1]: Started session-9.scope. Feb 12 19:33:05.577902 kernel: audit: type=1327 audit(1707766385.570:1150): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:05.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:05.579000 audit[2636]: USER_START pid=2636 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.580000 audit[2638]: CRED_ACQ pid=2638 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.584866 kernel: audit: type=1105 audit(1707766385.579:1151): pid=2636 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.584970 kernel: audit: type=1103 audit(1707766385.580:1152): pid=2638 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.719073 sshd[2636]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:05.719000 audit[2636]: USER_END pid=2636 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.721475 systemd[1]: sshd@8-10.0.0.23:22-10.0.0.1:59872.service: Deactivated successfully. Feb 12 19:33:05.722196 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:33:05.723075 systemd-logind[1112]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:33:05.719000 audit[2636]: CRED_DISP pid=2636 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.723919 systemd-logind[1112]: Removed session 9. Feb 12 19:33:05.726055 kernel: audit: type=1106 audit(1707766385.719:1153): pid=2636 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.726099 kernel: audit: type=1104 audit(1707766385.719:1154): pid=2636 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:05.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.23:22-10.0.0.1:59872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:05.950342 kubelet[2010]: E0212 19:33:05.950309 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:33:06.562775 env[1123]: time="2024-02-12T19:33:06.562727632Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:06.564378 env[1123]: time="2024-02-12T19:33:06.564353457Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:06.566197 env[1123]: time="2024-02-12T19:33:06.566158600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:06.567913 env[1123]: time="2024-02-12T19:33:06.567875065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:06.568493 env[1123]: time="2024-02-12T19:33:06.568460715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:33:06.569835 env[1123]: time="2024-02-12T19:33:06.569815081Z" level=info msg="CreateContainer within sandbox \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:33:06.583095 env[1123]: time="2024-02-12T19:33:06.583033569Z" level=info msg="CreateContainer within sandbox \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b\"" Feb 12 19:33:06.583609 env[1123]: time="2024-02-12T19:33:06.583570107Z" level=info msg="StartContainer for \"359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b\"" Feb 12 19:33:06.610845 systemd[1]: Started cri-containerd-359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b.scope. Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa1c7e342c8 items=0 ppid=2441 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:06.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396563666264346661353938633430643839366130376636356661 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit: BPF prog-id=142 op=LOAD Feb 12 19:33:06.624000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=2441 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:06.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396563666264346661353938633430643839366130376636356661 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit: BPF prog-id=143 op=LOAD Feb 12 19:33:06.624000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=2441 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:06.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396563666264346661353938633430643839366130376636356661 Feb 12 19:33:06.624000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:33:06.624000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:06.624000 audit: BPF prog-id=144 op=LOAD Feb 12 19:33:06.624000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=2441 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:06.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335396563666264346661353938633430643839366130376636356661 Feb 12 19:33:06.637406 env[1123]: time="2024-02-12T19:33:06.637365836Z" level=info msg="StartContainer for \"359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b\" returns successfully" Feb 12 19:33:06.743109 kubelet[2010]: I0212 19:33:06.743052 2010 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:33:06.743641 kubelet[2010]: E0212 19:33:06.743614 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:06.935000 audit[2685]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:06.935000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd48616950 a2=0 a3=7ffd4861693c items=0 ppid=2174 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:06.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:06.936000 audit[2685]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:06.936000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd48616950 a2=0 a3=7ffd4861693c items=0 ppid=2174 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:06.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:07.026928 kubelet[2010]: E0212 19:33:07.026900 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:07.027284 kubelet[2010]: E0212 19:33:07.027103 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:07.578347 systemd[1]: run-containerd-runc-k8s.io-359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b-runc.wSKuXn.mount: Deactivated successfully. Feb 12 19:33:07.652069 systemd[1]: cri-containerd-359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b.scope: Deactivated successfully. Feb 12 19:33:07.656000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:33:07.667425 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b-rootfs.mount: Deactivated successfully. Feb 12 19:33:07.671941 env[1123]: time="2024-02-12T19:33:07.671898097Z" level=info msg="shim disconnected" id=359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b Feb 12 19:33:07.671941 env[1123]: time="2024-02-12T19:33:07.671939234Z" level=warning msg="cleaning up after shim disconnected" id=359ecfbd4fa598c40d896a07f65fa11be19e2c1531258ec85dc6b99ce00a7b8b namespace=k8s.io Feb 12 19:33:07.672295 env[1123]: time="2024-02-12T19:33:07.671950836Z" level=info msg="cleaning up dead shim" Feb 12 19:33:07.677991 env[1123]: time="2024-02-12T19:33:07.677961729Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:33:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2707 runtime=io.containerd.runc.v2\n" Feb 12 19:33:07.750117 kubelet[2010]: I0212 19:33:07.750075 2010 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:33:07.763612 kubelet[2010]: I0212 19:33:07.763566 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:33:07.771435 kubelet[2010]: I0212 19:33:07.771168 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:33:07.771585 kubelet[2010]: I0212 19:33:07.771508 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:33:07.773724 systemd[1]: Created slice kubepods-burstable-pod52b27ad2_d1e7_4c37_bdd0_b210e490cdc7.slice. Feb 12 19:33:07.780733 systemd[1]: Created slice kubepods-burstable-pod31c6e01e_b009_45f6_ad8e_63923565f818.slice. Feb 12 19:33:07.785129 systemd[1]: Created slice kubepods-besteffort-podc18c8620_8870_44d8_816c_61566497ac58.slice. Feb 12 19:33:07.797812 kubelet[2010]: I0212 19:33:07.797779 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/52b27ad2-d1e7-4c37-bdd0-b210e490cdc7-config-volume\") pod \"coredns-5d78c9869d-t4p9k\" (UID: \"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7\") " pod="kube-system/coredns-5d78c9869d-t4p9k" Feb 12 19:33:07.797812 kubelet[2010]: I0212 19:33:07.797817 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fkw7r\" (UniqueName: \"kubernetes.io/projected/52b27ad2-d1e7-4c37-bdd0-b210e490cdc7-kube-api-access-fkw7r\") pod \"coredns-5d78c9869d-t4p9k\" (UID: \"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7\") " pod="kube-system/coredns-5d78c9869d-t4p9k" Feb 12 19:33:07.798123 kubelet[2010]: I0212 19:33:07.797841 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-72dzs\" (UniqueName: \"kubernetes.io/projected/c18c8620-8870-44d8-816c-61566497ac58-kube-api-access-72dzs\") pod \"calico-kube-controllers-777c696c4-s2rp9\" (UID: \"c18c8620-8870-44d8-816c-61566497ac58\") " pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" Feb 12 19:33:07.798123 kubelet[2010]: I0212 19:33:07.797865 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gwjgc\" (UniqueName: \"kubernetes.io/projected/31c6e01e-b009-45f6-ad8e-63923565f818-kube-api-access-gwjgc\") pod \"coredns-5d78c9869d-x9l8g\" (UID: \"31c6e01e-b009-45f6-ad8e-63923565f818\") " pod="kube-system/coredns-5d78c9869d-x9l8g" Feb 12 19:33:07.798123 kubelet[2010]: I0212 19:33:07.798071 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c18c8620-8870-44d8-816c-61566497ac58-tigera-ca-bundle\") pod \"calico-kube-controllers-777c696c4-s2rp9\" (UID: \"c18c8620-8870-44d8-816c-61566497ac58\") " pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" Feb 12 19:33:07.798123 kubelet[2010]: I0212 19:33:07.798107 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/31c6e01e-b009-45f6-ad8e-63923565f818-config-volume\") pod \"coredns-5d78c9869d-x9l8g\" (UID: \"31c6e01e-b009-45f6-ad8e-63923565f818\") " pod="kube-system/coredns-5d78c9869d-x9l8g" Feb 12 19:33:07.954813 systemd[1]: Created slice kubepods-besteffort-pod9a7c17c9_efe7_4057_8573_954bb191e1a8.slice. Feb 12 19:33:07.956628 env[1123]: time="2024-02-12T19:33:07.956591134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r7lmb,Uid:9a7c17c9-efe7-4057-8573-954bb191e1a8,Namespace:calico-system,Attempt:0,}" Feb 12 19:33:08.030348 kubelet[2010]: E0212 19:33:08.030316 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:08.031928 env[1123]: time="2024-02-12T19:33:08.031863953Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:33:08.077946 kubelet[2010]: E0212 19:33:08.077898 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:08.078643 env[1123]: time="2024-02-12T19:33:08.078589643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-t4p9k,Uid:52b27ad2-d1e7-4c37-bdd0-b210e490cdc7,Namespace:kube-system,Attempt:0,}" Feb 12 19:33:08.082817 kubelet[2010]: E0212 19:33:08.082786 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:08.083267 env[1123]: time="2024-02-12T19:33:08.083223979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x9l8g,Uid:31c6e01e-b009-45f6-ad8e-63923565f818,Namespace:kube-system,Attempt:0,}" Feb 12 19:33:08.088071 env[1123]: time="2024-02-12T19:33:08.088018857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-777c696c4-s2rp9,Uid:c18c8620-8870-44d8-816c-61566497ac58,Namespace:calico-system,Attempt:0,}" Feb 12 19:33:08.433432 env[1123]: time="2024-02-12T19:33:08.433343529Z" level=error msg="Failed to destroy network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.433806 env[1123]: time="2024-02-12T19:33:08.433726738Z" level=error msg="encountered an error cleaning up failed sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.433806 env[1123]: time="2024-02-12T19:33:08.433784668Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-t4p9k,Uid:52b27ad2-d1e7-4c37-bdd0-b210e490cdc7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.434078 kubelet[2010]: E0212 19:33:08.434046 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.434248 kubelet[2010]: E0212 19:33:08.434102 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-t4p9k" Feb 12 19:33:08.434248 kubelet[2010]: E0212 19:33:08.434125 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-t4p9k" Feb 12 19:33:08.434248 kubelet[2010]: E0212 19:33:08.434177 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-t4p9k_kube-system(52b27ad2-d1e7-4c37-bdd0-b210e490cdc7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-t4p9k_kube-system(52b27ad2-d1e7-4c37-bdd0-b210e490cdc7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-t4p9k" podUID=52b27ad2-d1e7-4c37-bdd0-b210e490cdc7 Feb 12 19:33:08.436047 env[1123]: time="2024-02-12T19:33:08.435976496Z" level=error msg="Failed to destroy network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.436382 env[1123]: time="2024-02-12T19:33:08.436350628Z" level=error msg="encountered an error cleaning up failed sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.436442 env[1123]: time="2024-02-12T19:33:08.436409879Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r7lmb,Uid:9a7c17c9-efe7-4057-8573-954bb191e1a8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.436963 kubelet[2010]: E0212 19:33:08.436733 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.436963 kubelet[2010]: E0212 19:33:08.436797 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:33:08.436963 kubelet[2010]: E0212 19:33:08.436816 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r7lmb" Feb 12 19:33:08.437109 kubelet[2010]: E0212 19:33:08.436860 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-r7lmb_calico-system(9a7c17c9-efe7-4057-8573-954bb191e1a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-r7lmb_calico-system(9a7c17c9-efe7-4057-8573-954bb191e1a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:33:08.445966 env[1123]: time="2024-02-12T19:33:08.445909606Z" level=error msg="Failed to destroy network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.446292 env[1123]: time="2024-02-12T19:33:08.446262739Z" level=error msg="encountered an error cleaning up failed sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.446356 env[1123]: time="2024-02-12T19:33:08.446313324Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x9l8g,Uid:31c6e01e-b009-45f6-ad8e-63923565f818,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.446537 kubelet[2010]: E0212 19:33:08.446509 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.446537 kubelet[2010]: E0212 19:33:08.446540 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-x9l8g" Feb 12 19:33:08.446730 kubelet[2010]: E0212 19:33:08.446556 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-x9l8g" Feb 12 19:33:08.446730 kubelet[2010]: E0212 19:33:08.446591 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-x9l8g_kube-system(31c6e01e-b009-45f6-ad8e-63923565f818)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-x9l8g_kube-system(31c6e01e-b009-45f6-ad8e-63923565f818)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-x9l8g" podUID=31c6e01e-b009-45f6-ad8e-63923565f818 Feb 12 19:33:08.451682 env[1123]: time="2024-02-12T19:33:08.451633308Z" level=error msg="Failed to destroy network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.451914 env[1123]: time="2024-02-12T19:33:08.451880613Z" level=error msg="encountered an error cleaning up failed sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.451950 env[1123]: time="2024-02-12T19:33:08.451922441Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-777c696c4-s2rp9,Uid:c18c8620-8870-44d8-816c-61566497ac58,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.452141 kubelet[2010]: E0212 19:33:08.452120 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:08.452189 kubelet[2010]: E0212 19:33:08.452162 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" Feb 12 19:33:08.452189 kubelet[2010]: E0212 19:33:08.452185 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" Feb 12 19:33:08.452242 kubelet[2010]: E0212 19:33:08.452236 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-777c696c4-s2rp9_calico-system(c18c8620-8870-44d8-816c-61566497ac58)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-777c696c4-s2rp9_calico-system(c18c8620-8870-44d8-816c-61566497ac58)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" podUID=c18c8620-8870-44d8-816c-61566497ac58 Feb 12 19:33:08.579037 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c-shm.mount: Deactivated successfully. Feb 12 19:33:09.032580 kubelet[2010]: I0212 19:33:09.032552 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:09.033260 env[1123]: time="2024-02-12T19:33:09.033224928Z" level=info msg="StopPodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\"" Feb 12 19:33:09.033957 kubelet[2010]: I0212 19:33:09.033927 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:09.034380 env[1123]: time="2024-02-12T19:33:09.034349289Z" level=info msg="StopPodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\"" Feb 12 19:33:09.035749 kubelet[2010]: I0212 19:33:09.035729 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:09.036487 env[1123]: time="2024-02-12T19:33:09.036459324Z" level=info msg="StopPodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\"" Feb 12 19:33:09.040536 kubelet[2010]: I0212 19:33:09.039926 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:09.040684 env[1123]: time="2024-02-12T19:33:09.040336496Z" level=info msg="StopPodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\"" Feb 12 19:33:09.064197 env[1123]: time="2024-02-12T19:33:09.064127826Z" level=error msg="StopPodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" failed" error="failed to destroy network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:09.064466 env[1123]: time="2024-02-12T19:33:09.064436295Z" level=error msg="StopPodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" failed" error="failed to destroy network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:09.064522 kubelet[2010]: E0212 19:33:09.064449 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:09.064522 kubelet[2010]: E0212 19:33:09.064503 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90} Feb 12 19:33:09.064582 kubelet[2010]: E0212 19:33:09.064545 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:33:09.064643 kubelet[2010]: E0212 19:33:09.064579 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-t4p9k" podUID=52b27ad2-d1e7-4c37-bdd0-b210e490cdc7 Feb 12 19:33:09.064846 kubelet[2010]: E0212 19:33:09.064832 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:09.064919 kubelet[2010]: E0212 19:33:09.064851 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6} Feb 12 19:33:09.064919 kubelet[2010]: E0212 19:33:09.064876 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31c6e01e-b009-45f6-ad8e-63923565f818\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:33:09.064919 kubelet[2010]: E0212 19:33:09.064898 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31c6e01e-b009-45f6-ad8e-63923565f818\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-x9l8g" podUID=31c6e01e-b009-45f6-ad8e-63923565f818 Feb 12 19:33:09.072308 env[1123]: time="2024-02-12T19:33:09.072252927Z" level=error msg="StopPodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" failed" error="failed to destroy network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:09.072551 kubelet[2010]: E0212 19:33:09.072520 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:09.072624 kubelet[2010]: E0212 19:33:09.072556 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c} Feb 12 19:33:09.072624 kubelet[2010]: E0212 19:33:09.072586 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a7c17c9-efe7-4057-8573-954bb191e1a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:33:09.072624 kubelet[2010]: E0212 19:33:09.072619 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a7c17c9-efe7-4057-8573-954bb191e1a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r7lmb" podUID=9a7c17c9-efe7-4057-8573-954bb191e1a8 Feb 12 19:33:09.076897 env[1123]: time="2024-02-12T19:33:09.076847218Z" level=error msg="StopPodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" failed" error="failed to destroy network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:33:09.077102 kubelet[2010]: E0212 19:33:09.077081 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:09.077159 kubelet[2010]: E0212 19:33:09.077118 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae} Feb 12 19:33:09.077195 kubelet[2010]: E0212 19:33:09.077160 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c18c8620-8870-44d8-816c-61566497ac58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:33:09.077264 kubelet[2010]: E0212 19:33:09.077210 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c18c8620-8870-44d8-816c-61566497ac58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" podUID=c18c8620-8870-44d8-816c-61566497ac58 Feb 12 19:33:10.722878 systemd[1]: Started sshd@9-10.0.0.23:22-10.0.0.1:48714.service. Feb 12 19:33:10.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.23:22-10.0.0.1:48714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:10.726612 kernel: kauditd_printk_skb: 51 callbacks suppressed Feb 12 19:33:10.726677 kernel: audit: type=1130 audit(1707766390.722:1165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.23:22-10.0.0.1:48714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:10.755000 audit[2971]: USER_ACCT pid=2971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.756084 sshd[2971]: Accepted publickey for core from 10.0.0.1 port 48714 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:10.758235 sshd[2971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:10.757000 audit[2971]: CRED_ACQ pid=2971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.760952 kernel: audit: type=1101 audit(1707766390.755:1166): pid=2971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.761064 kernel: audit: type=1103 audit(1707766390.757:1167): pid=2971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.761085 kernel: audit: type=1006 audit(1707766390.757:1168): pid=2971 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:33:10.761763 systemd-logind[1112]: New session 10 of user core. Feb 12 19:33:10.762473 kernel: audit: type=1300 audit(1707766390.757:1168): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1515a90 a2=3 a3=0 items=0 ppid=1 pid=2971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:10.757000 audit[2971]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1515a90 a2=3 a3=0 items=0 ppid=1 pid=2971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:10.762498 systemd[1]: Started session-10.scope. Feb 12 19:33:10.765359 kernel: audit: type=1327 audit(1707766390.757:1168): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:10.757000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:10.766000 audit[2971]: USER_START pid=2971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.767000 audit[2973]: CRED_ACQ pid=2973 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.772230 kernel: audit: type=1105 audit(1707766390.766:1169): pid=2971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.772263 kernel: audit: type=1103 audit(1707766390.767:1170): pid=2973 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.868497 sshd[2971]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:10.868000 audit[2971]: USER_END pid=2971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.870897 systemd[1]: sshd@9-10.0.0.23:22-10.0.0.1:48714.service: Deactivated successfully. Feb 12 19:33:10.871606 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:33:10.868000 audit[2971]: CRED_DISP pid=2971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.873374 systemd-logind[1112]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:33:10.874137 systemd-logind[1112]: Removed session 10. Feb 12 19:33:10.874703 kernel: audit: type=1106 audit(1707766390.868:1171): pid=2971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.874740 kernel: audit: type=1104 audit(1707766390.868:1172): pid=2971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:10.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.23:22-10.0.0.1:48714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:15.872009 systemd[1]: Started sshd@10-10.0.0.23:22-10.0.0.1:48728.service. Feb 12 19:33:15.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.23:22-10.0.0.1:48728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:15.872798 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:33:15.872872 kernel: audit: type=1130 audit(1707766395.871:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.23:22-10.0.0.1:48728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:15.908000 audit[2987]: USER_ACCT pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.912000 audit[2987]: CRED_ACQ pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.913276 sshd[2987]: Accepted publickey for core from 10.0.0.1 port 48728 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:15.913371 sshd[2987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:15.913696 kernel: audit: type=1101 audit(1707766395.908:1175): pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.913741 kernel: audit: type=1103 audit(1707766395.912:1176): pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.917256 kernel: audit: type=1006 audit(1707766395.912:1177): pid=2987 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:33:15.917300 kernel: audit: type=1300 audit(1707766395.912:1177): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb59f6370 a2=3 a3=0 items=0 ppid=1 pid=2987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:15.912000 audit[2987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb59f6370 a2=3 a3=0 items=0 ppid=1 pid=2987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:15.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:15.921466 kernel: audit: type=1327 audit(1707766395.912:1177): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:15.927081 systemd[1]: Started session-11.scope. Feb 12 19:33:15.927635 systemd-logind[1112]: New session 11 of user core. Feb 12 19:33:15.936000 audit[2987]: USER_START pid=2987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.939000 audit[2989]: CRED_ACQ pid=2989 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.943265 kernel: audit: type=1105 audit(1707766395.936:1178): pid=2987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:15.943316 kernel: audit: type=1103 audit(1707766395.939:1179): pid=2989 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:16.048258 sshd[2987]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:16.048000 audit[2987]: USER_END pid=2987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:16.051060 systemd[1]: sshd@10-10.0.0.23:22-10.0.0.1:48728.service: Deactivated successfully. Feb 12 19:33:16.052061 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:33:16.048000 audit[2987]: CRED_DISP pid=2987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:16.055526 kernel: audit: type=1106 audit(1707766396.048:1180): pid=2987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:16.055579 kernel: audit: type=1104 audit(1707766396.048:1181): pid=2987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:16.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.23:22-10.0.0.1:48728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:16.056218 systemd-logind[1112]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:33:16.057384 systemd-logind[1112]: Removed session 11. Feb 12 19:33:16.445488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount76901953.mount: Deactivated successfully. Feb 12 19:33:18.388779 env[1123]: time="2024-02-12T19:33:18.388715781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:18.390481 env[1123]: time="2024-02-12T19:33:18.390438985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:18.392025 env[1123]: time="2024-02-12T19:33:18.391987652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:18.393592 env[1123]: time="2024-02-12T19:33:18.393561145Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:18.394076 env[1123]: time="2024-02-12T19:33:18.394043430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:33:18.400310 env[1123]: time="2024-02-12T19:33:18.400277762Z" level=info msg="CreateContainer within sandbox \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:33:18.412131 env[1123]: time="2024-02-12T19:33:18.412088941Z" level=info msg="CreateContainer within sandbox \"67b1dc00df6848e305bfa5a8c976629b390d3dc023a32cc77ad1eb4f5c60a975\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d48075275c68d5cc39318e8a904e0a91a63293e5aa51c85b4648c52b461ba906\"" Feb 12 19:33:18.412589 env[1123]: time="2024-02-12T19:33:18.412561086Z" level=info msg="StartContainer for \"d48075275c68d5cc39318e8a904e0a91a63293e5aa51c85b4648c52b461ba906\"" Feb 12 19:33:18.427187 systemd[1]: Started cri-containerd-d48075275c68d5cc39318e8a904e0a91a63293e5aa51c85b4648c52b461ba906.scope. Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f8101256f88 items=0 ppid=2441 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:18.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383037353237356336386435636333393331386538613930346530 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit: BPF prog-id=145 op=LOAD Feb 12 19:33:18.440000 audit[3009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0001fcb68 items=0 ppid=2441 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:18.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383037353237356336386435636333393331386538613930346530 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit: BPF prog-id=146 op=LOAD Feb 12 19:33:18.440000 audit[3009]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0001fcbb8 items=0 ppid=2441 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:18.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383037353237356336386435636333393331386538613930346530 Feb 12 19:33:18.440000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:33:18.440000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:18.440000 audit: BPF prog-id=147 op=LOAD Feb 12 19:33:18.440000 audit[3009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0001fcc48 items=0 ppid=2441 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:18.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383037353237356336386435636333393331386538613930346530 Feb 12 19:33:18.454269 env[1123]: time="2024-02-12T19:33:18.454221429Z" level=info msg="StartContainer for \"d48075275c68d5cc39318e8a904e0a91a63293e5aa51c85b4648c52b461ba906\" returns successfully" Feb 12 19:33:18.514531 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:33:18.514640 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:33:19.065627 kubelet[2010]: E0212 19:33:19.065591 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:19.077710 kubelet[2010]: I0212 19:33:19.077616 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-p75f2" podStartSLOduration=1.74284155 podCreationTimestamp="2024-02-12 19:32:48 +0000 UTC" firstStartedPulling="2024-02-12 19:32:49.059564019 +0000 UTC m=+19.190625206" lastFinishedPulling="2024-02-12 19:33:18.39429361 +0000 UTC m=+48.525354797" observedRunningTime="2024-02-12 19:33:19.075154406 +0000 UTC m=+49.206215593" watchObservedRunningTime="2024-02-12 19:33:19.077571141 +0000 UTC m=+49.208632328" Feb 12 19:33:19.728000 audit[3129]: AVC avc: denied { write } for pid=3129 comm="tee" name="fd" dev="proc" ino=24158 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.728000 audit[3129]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2e37697f a2=241 a3=1b6 items=1 ppid=3105 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.728000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:33:19.728000 audit: PATH item=0 name="/dev/fd/63" inode=24986 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.728000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.730000 audit[3153]: AVC avc: denied { write } for pid=3153 comm="tee" name="fd" dev="proc" ino=25615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.730000 audit[3153]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef94d7991 a2=241 a3=1b6 items=1 ppid=3119 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.730000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:33:19.730000 audit: PATH item=0 name="/dev/fd/63" inode=25001 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.730000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.736000 audit[3150]: AVC avc: denied { write } for pid=3150 comm="tee" name="fd" dev="proc" ino=25619 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.736000 audit[3150]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1981a990 a2=241 a3=1b6 items=1 ppid=3114 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.736000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:33:19.736000 audit: PATH item=0 name="/dev/fd/63" inode=25000 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.736000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.741000 audit[3160]: AVC avc: denied { write } for pid=3160 comm="tee" name="fd" dev="proc" ino=26631 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.741000 audit[3160]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd17544980 a2=241 a3=1b6 items=1 ppid=3110 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.745000 audit[3170]: AVC avc: denied { write } for pid=3170 comm="tee" name="fd" dev="proc" ino=25625 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.745000 audit[3170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda5edf98f a2=241 a3=1b6 items=1 ppid=3109 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.745000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:33:19.745000 audit: PATH item=0 name="/dev/fd/63" inode=25012 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.746000 audit[3166]: AVC avc: denied { write } for pid=3166 comm="tee" name="fd" dev="proc" ino=25629 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.746000 audit[3166]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca245e98f a2=241 a3=1b6 items=1 ppid=3104 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.746000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:33:19.746000 audit: PATH item=0 name="/dev/fd/63" inode=25009 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.746000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.741000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:33:19.741000 audit: PATH item=0 name="/dev/fd/63" inode=24162 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.741000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.756000 audit[3164]: AVC avc: denied { write } for pid=3164 comm="tee" name="fd" dev="proc" ino=25633 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:33:19.756000 audit[3164]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecf49498f a2=241 a3=1b6 items=1 ppid=3101 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.756000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:33:19.756000 audit: PATH item=0 name="/dev/fd/63" inode=25008 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:33:19.756000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit: BPF prog-id=148 op=LOAD Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7258a470 a2=70 a3=7f714f338000 items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.949000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit: BPF prog-id=149 op=LOAD Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7258a470 a2=70 a3=6e items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.949000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7258a420 a2=70 a3=7fff7258a470 items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit: BPF prog-id=150 op=LOAD Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff7258a400 a2=70 a3=7fff7258a470 items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.949000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7258a4e0 a2=70 a3=0 items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7258a4d0 a2=70 a3=0 items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.949000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.949000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff7258a510 a2=70 a3=0 items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.950000 audit: BPF prog-id=151 op=LOAD Feb 12 19:33:19.950000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff7258a430 a2=70 a3=ffffffff items=0 ppid=3111 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:33:19.956000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.956000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd745852e0 a2=70 a3=208 items=0 ppid=3111 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:33:19.957000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:19.957000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd745851b0 a2=70 a3=3 items=0 ppid=3111 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:19.957000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:33:19.964000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:33:20.057000 audit[3276]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:20.057000 audit[3276]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe840fa9a0 a2=0 a3=7ffe840fa98c items=0 ppid=3111 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:20.057000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:20.062000 audit[3277]: NETFILTER_CFG table=nat:98 family=2 entries=16 op=nft_register_chain pid=3277 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:20.062000 audit[3277]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff318ae3d0 a2=0 a3=7fff318ae3bc items=0 ppid=3111 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:20.062000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:20.064000 audit[3274]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3274 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:20.064000 audit[3274]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc772dd1f0 a2=0 a3=55cd94cf3000 items=0 ppid=3111 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:20.064000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:20.067619 kubelet[2010]: E0212 19:33:20.067593 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:20.079000 audit[3278]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3278 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:20.079000 audit[3278]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffee538bb20 a2=0 a3=55d9ec493000 items=0 ppid=3111 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:20.079000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:20.092839 systemd[1]: run-containerd-runc-k8s.io-d48075275c68d5cc39318e8a904e0a91a63293e5aa51c85b4648c52b461ba906-runc.ScJclG.mount: Deactivated successfully. Feb 12 19:33:20.875113 systemd-networkd[1015]: vxlan.calico: Link UP Feb 12 19:33:20.875125 systemd-networkd[1015]: vxlan.calico: Gained carrier Feb 12 19:33:20.951212 env[1123]: time="2024-02-12T19:33:20.951172619Z" level=info msg="StopPodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\"" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:20.989 [INFO][3328] k8s.go 578: Cleaning up netns ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:20.990 [INFO][3328] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" iface="eth0" netns="/var/run/netns/cni-e7a323fa-cf33-d78f-6094-45054233b194" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:20.990 [INFO][3328] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" iface="eth0" netns="/var/run/netns/cni-e7a323fa-cf33-d78f-6094-45054233b194" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:20.990 [INFO][3328] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" iface="eth0" netns="/var/run/netns/cni-e7a323fa-cf33-d78f-6094-45054233b194" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:20.990 [INFO][3328] k8s.go 585: Releasing IP address(es) ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:20.990 [INFO][3328] utils.go 188: Calico CNI releasing IP address ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.026 [INFO][3336] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.027 [INFO][3336] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.027 [INFO][3336] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.034 [WARNING][3336] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.034 [INFO][3336] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.035 [INFO][3336] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:21.039145 env[1123]: 2024-02-12 19:33:21.037 [INFO][3328] k8s.go 591: Teardown processing complete. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:21.039641 env[1123]: time="2024-02-12T19:33:21.039272940Z" level=info msg="TearDown network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" successfully" Feb 12 19:33:21.039641 env[1123]: time="2024-02-12T19:33:21.039304900Z" level=info msg="StopPodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" returns successfully" Feb 12 19:33:21.039923 env[1123]: time="2024-02-12T19:33:21.039904606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-777c696c4-s2rp9,Uid:c18c8620-8870-44d8-816c-61566497ac58,Namespace:calico-system,Attempt:1,}" Feb 12 19:33:21.041450 systemd[1]: run-netns-cni\x2de7a323fa\x2dcf33\x2dd78f\x2d6094\x2d45054233b194.mount: Deactivated successfully. Feb 12 19:33:21.052830 systemd[1]: Started sshd@11-10.0.0.23:22-10.0.0.1:41560.service. Feb 12 19:33:21.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.23:22-10.0.0.1:41560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:21.057973 kernel: kauditd_printk_skb: 162 callbacks suppressed Feb 12 19:33:21.058028 kernel: audit: type=1130 audit(1707766401.052:1214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.23:22-10.0.0.1:41560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:21.203000 audit[3345]: USER_ACCT pid=3345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.204352 sshd[3345]: Accepted publickey for core from 10.0.0.1 port 41560 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:21.207842 kernel: audit: type=1101 audit(1707766401.203:1215): pid=3345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.208000 audit[3345]: CRED_ACQ pid=3345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.209831 sshd[3345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:21.213890 kernel: audit: type=1103 audit(1707766401.208:1216): pid=3345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.213932 kernel: audit: type=1006 audit(1707766401.208:1217): pid=3345 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:33:21.213951 kernel: audit: type=1300 audit(1707766401.208:1217): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38f9e490 a2=3 a3=0 items=0 ppid=1 pid=3345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.208000 audit[3345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38f9e490 a2=3 a3=0 items=0 ppid=1 pid=3345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.214307 systemd-logind[1112]: New session 12 of user core. Feb 12 19:33:21.215231 systemd[1]: Started session-12.scope. Feb 12 19:33:21.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:21.217419 kernel: audit: type=1327 audit(1707766401.208:1217): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:21.218000 audit[3345]: USER_START pid=3345 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.220000 audit[3362]: CRED_ACQ pid=3362 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.224738 kernel: audit: type=1105 audit(1707766401.218:1218): pid=3345 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.224796 kernel: audit: type=1103 audit(1707766401.220:1219): pid=3362 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.296161 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:33:21.296262 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali474e8d53451: link becomes ready Feb 12 19:33:21.298612 systemd-networkd[1015]: cali474e8d53451: Link UP Feb 12 19:33:21.299046 systemd-networkd[1015]: cali474e8d53451: Gained carrier Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.229 [INFO][3348] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0 calico-kube-controllers-777c696c4- calico-system c18c8620-8870-44d8-816c-61566497ac58 835 0 2024-02-12 19:32:48 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:777c696c4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-777c696c4-s2rp9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali474e8d53451 [] []}} ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.229 [INFO][3348] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.254 [INFO][3364] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" HandleID="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.261 [INFO][3364] ipam_plugin.go 268: Auto assigning IP ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" HandleID="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dce60), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-777c696c4-s2rp9", "timestamp":"2024-02-12 19:33:21.254056585 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.261 [INFO][3364] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.261 [INFO][3364] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.261 [INFO][3364] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.262 [INFO][3364] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.266 [INFO][3364] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.270 [INFO][3364] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.271 [INFO][3364] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.273 [INFO][3364] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.273 [INFO][3364] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.275 [INFO][3364] ipam.go 1682: Creating new handle: k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8 Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.280 [INFO][3364] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.284 [INFO][3364] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.285 [INFO][3364] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" host="localhost" Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.285 [INFO][3364] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:21.310844 env[1123]: 2024-02-12 19:33:21.285 [INFO][3364] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" HandleID="k8s-pod-network.8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.311566 env[1123]: 2024-02-12 19:33:21.288 [INFO][3348] k8s.go 385: Populated endpoint ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0", GenerateName:"calico-kube-controllers-777c696c4-", Namespace:"calico-system", SelfLink:"", UID:"c18c8620-8870-44d8-816c-61566497ac58", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"777c696c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-777c696c4-s2rp9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali474e8d53451", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:21.311566 env[1123]: 2024-02-12 19:33:21.288 [INFO][3348] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.311566 env[1123]: 2024-02-12 19:33:21.289 [INFO][3348] dataplane_linux.go 68: Setting the host side veth name to cali474e8d53451 ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.311566 env[1123]: 2024-02-12 19:33:21.296 [INFO][3348] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.311566 env[1123]: 2024-02-12 19:33:21.296 [INFO][3348] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0", GenerateName:"calico-kube-controllers-777c696c4-", Namespace:"calico-system", SelfLink:"", UID:"c18c8620-8870-44d8-816c-61566497ac58", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"777c696c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8", Pod:"calico-kube-controllers-777c696c4-s2rp9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali474e8d53451", MAC:"82:de:3a:db:e3:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:21.311566 env[1123]: 2024-02-12 19:33:21.309 [INFO][3348] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8" Namespace="calico-system" Pod="calico-kube-controllers-777c696c4-s2rp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:21.325000 audit[3402]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:21.327486 env[1123]: time="2024-02-12T19:33:21.327411771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:33:21.327604 env[1123]: time="2024-02-12T19:33:21.327471292Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:33:21.327604 env[1123]: time="2024-02-12T19:33:21.327492642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:33:21.327843 env[1123]: time="2024-02-12T19:33:21.327798446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8 pid=3406 runtime=io.containerd.runc.v2 Feb 12 19:33:21.328709 kernel: audit: type=1325 audit(1707766401.325:1220): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:21.328774 kernel: audit: type=1300 audit(1707766401.325:1220): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd1e968530 a2=0 a3=7ffd1e96851c items=0 ppid=3111 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.325000 audit[3402]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd1e968530 a2=0 a3=7ffd1e96851c items=0 ppid=3111 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.325000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:21.343198 systemd[1]: Started cri-containerd-8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8.scope. Feb 12 19:33:21.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.23:22-10.0.0.1:41574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:21.358429 systemd[1]: Started sshd@12-10.0.0.23:22-10.0.0.1:41574.service. Feb 12 19:33:21.356077 sshd[3345]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:21.360000 audit[3345]: USER_END pid=3345 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.360000 audit[3345]: CRED_DISP pid=3345 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.23:22-10.0.0.1:41560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:21.362403 systemd[1]: sshd@11-10.0.0.23:22-10.0.0.1:41560.service: Deactivated successfully. Feb 12 19:33:21.363215 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:33:21.365612 systemd-logind[1112]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:33:21.366383 systemd-logind[1112]: Removed session 12. Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.367000 audit: BPF prog-id=152 op=LOAD Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3406 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363333363065306336613139663465353536363964623961326335 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3406 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363333363065306336613139663465353536363964623961326335 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.369000 audit: BPF prog-id=153 op=LOAD Feb 12 19:33:21.369000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bf2b0 items=0 ppid=3406 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363333363065306336613139663465353536363964623961326335 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.370000 audit: BPF prog-id=154 op=LOAD Feb 12 19:33:21.370000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bf2f8 items=0 ppid=3406 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363333363065306336613139663465353536363964623961326335 Feb 12 19:33:21.371000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:33:21.371000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:21.371000 audit: BPF prog-id=155 op=LOAD Feb 12 19:33:21.371000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bf708 items=0 ppid=3406 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363333363065306336613139663465353536363964623961326335 Feb 12 19:33:21.373728 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:33:21.392000 audit[3435]: USER_ACCT pid=3435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.393561 sshd[3435]: Accepted publickey for core from 10.0.0.1 port 41574 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:21.394000 audit[3435]: CRED_ACQ pid=3435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.394000 audit[3435]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedd85d0f0 a2=3 a3=0 items=0 ppid=1 pid=3435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:21.394000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:21.395090 sshd[3435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:21.401284 systemd[1]: Started session-13.scope. Feb 12 19:33:21.403883 systemd-logind[1112]: New session 13 of user core. Feb 12 19:33:21.405210 env[1123]: time="2024-02-12T19:33:21.405111047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-777c696c4-s2rp9,Uid:c18c8620-8870-44d8-816c-61566497ac58,Namespace:calico-system,Attempt:1,} returns sandbox id \"8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8\"" Feb 12 19:33:21.407279 env[1123]: time="2024-02-12T19:33:21.407244832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:33:21.410000 audit[3435]: USER_START pid=3435 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.412000 audit[3445]: CRED_ACQ pid=3445 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:21.951464 env[1123]: time="2024-02-12T19:33:21.951414009Z" level=info msg="StopPodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\"" Feb 12 19:33:21.952629 env[1123]: time="2024-02-12T19:33:21.951967437Z" level=info msg="StopPodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\"" Feb 12 19:33:22.041028 systemd[1]: run-containerd-runc-k8s.io-8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8-runc.627Ern.mount: Deactivated successfully. Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.005 [INFO][3486] k8s.go 578: Cleaning up netns ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.006 [INFO][3486] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" iface="eth0" netns="/var/run/netns/cni-ee9eb17a-8c35-dff4-7422-9cd155055a29" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.006 [INFO][3486] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" iface="eth0" netns="/var/run/netns/cni-ee9eb17a-8c35-dff4-7422-9cd155055a29" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.006 [INFO][3486] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" iface="eth0" netns="/var/run/netns/cni-ee9eb17a-8c35-dff4-7422-9cd155055a29" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.006 [INFO][3486] k8s.go 585: Releasing IP address(es) ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.006 [INFO][3486] utils.go 188: Calico CNI releasing IP address ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.035 [INFO][3499] ipam_plugin.go 415: Releasing address using handleID ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.036 [INFO][3499] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.036 [INFO][3499] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.042 [WARNING][3499] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.042 [INFO][3499] ipam_plugin.go 443: Releasing address using workloadID ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.044 [INFO][3499] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:22.055540 env[1123]: 2024-02-12 19:33:22.048 [INFO][3486] k8s.go 591: Teardown processing complete. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:22.060113 env[1123]: time="2024-02-12T19:33:22.055756669Z" level=info msg="TearDown network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" successfully" Feb 12 19:33:22.060113 env[1123]: time="2024-02-12T19:33:22.055796614Z" level=info msg="StopPodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" returns successfully" Feb 12 19:33:22.057378 systemd[1]: run-netns-cni\x2dee9eb17a\x2d8c35\x2ddff4\x2d7422\x2d9cd155055a29.mount: Deactivated successfully. Feb 12 19:33:22.061306 env[1123]: time="2024-02-12T19:33:22.061277879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r7lmb,Uid:9a7c17c9-efe7-4057-8573-954bb191e1a8,Namespace:calico-system,Attempt:1,}" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.049 [INFO][3491] k8s.go 578: Cleaning up netns ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.049 [INFO][3491] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" iface="eth0" netns="/var/run/netns/cni-96096588-0ad1-a97a-9609-86b2df586692" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.049 [INFO][3491] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" iface="eth0" netns="/var/run/netns/cni-96096588-0ad1-a97a-9609-86b2df586692" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.050 [INFO][3491] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" iface="eth0" netns="/var/run/netns/cni-96096588-0ad1-a97a-9609-86b2df586692" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.050 [INFO][3491] k8s.go 585: Releasing IP address(es) ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.050 [INFO][3491] utils.go 188: Calico CNI releasing IP address ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.088 [INFO][3507] ipam_plugin.go 415: Releasing address using handleID ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.088 [INFO][3507] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.088 [INFO][3507] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.100 [WARNING][3507] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.100 [INFO][3507] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.102 [INFO][3507] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:22.111001 env[1123]: 2024-02-12 19:33:22.105 [INFO][3491] k8s.go 591: Teardown processing complete. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:22.111001 env[1123]: time="2024-02-12T19:33:22.110753910Z" level=info msg="TearDown network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" successfully" Feb 12 19:33:22.111001 env[1123]: time="2024-02-12T19:33:22.110782273Z" level=info msg="StopPodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" returns successfully" Feb 12 19:33:22.108540 systemd[1]: run-netns-cni\x2d96096588\x2d0ad1\x2da97a\x2d9609\x2d86b2df586692.mount: Deactivated successfully. Feb 12 19:33:22.113446 kubelet[2010]: E0212 19:33:22.112977 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:22.113812 env[1123]: time="2024-02-12T19:33:22.113348198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x9l8g,Uid:31c6e01e-b009-45f6-ad8e-63923565f818,Namespace:kube-system,Attempt:1,}" Feb 12 19:33:22.206551 systemd-networkd[1015]: calif2ae8828671: Link UP Feb 12 19:33:22.208806 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif2ae8828671: link becomes ready Feb 12 19:33:22.208381 systemd-networkd[1015]: calif2ae8828671: Gained carrier Feb 12 19:33:22.218541 sshd[3435]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:22.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.23:22-10.0.0.1:41582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:22.220999 systemd[1]: Started sshd@13-10.0.0.23:22-10.0.0.1:41582.service. Feb 12 19:33:22.223000 audit[3435]: USER_END pid=3435 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.223000 audit[3435]: CRED_DISP pid=3435 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.23:22-10.0.0.1:41574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:22.225210 systemd[1]: sshd@12-10.0.0.23:22-10.0.0.1:41574.service: Deactivated successfully. Feb 12 19:33:22.225814 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:33:22.227747 systemd-logind[1112]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:33:22.231455 systemd-logind[1112]: Removed session 13. Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.130 [INFO][3514] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--r7lmb-eth0 csi-node-driver- calico-system 9a7c17c9-efe7-4057-8573-954bb191e1a8 848 0 2024-02-12 19:32:48 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-r7lmb eth0 default [] [] [kns.calico-system ksa.calico-system.default] calif2ae8828671 [] []}} ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.130 [INFO][3514] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.171 [INFO][3529] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" HandleID="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.179 [INFO][3529] ipam_plugin.go 268: Auto assigning IP ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" HandleID="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000226af0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-r7lmb", "timestamp":"2024-02-12 19:33:22.171875653 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.179 [INFO][3529] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.179 [INFO][3529] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.179 [INFO][3529] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.181 [INFO][3529] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.184 [INFO][3529] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.186 [INFO][3529] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.191 [INFO][3529] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.193 [INFO][3529] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.193 [INFO][3529] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.194 [INFO][3529] ipam.go 1682: Creating new handle: k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957 Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.197 [INFO][3529] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.201 [INFO][3529] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.201 [INFO][3529] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" host="localhost" Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.201 [INFO][3529] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:22.233978 env[1123]: 2024-02-12 19:33:22.201 [INFO][3529] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" HandleID="k8s-pod-network.35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.234711 env[1123]: 2024-02-12 19:33:22.203 [INFO][3514] k8s.go 385: Populated endpoint ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--r7lmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a7c17c9-efe7-4057-8573-954bb191e1a8", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-r7lmb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2ae8828671", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:22.234711 env[1123]: 2024-02-12 19:33:22.203 [INFO][3514] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.234711 env[1123]: 2024-02-12 19:33:22.203 [INFO][3514] dataplane_linux.go 68: Setting the host side veth name to calif2ae8828671 ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.234711 env[1123]: 2024-02-12 19:33:22.213 [INFO][3514] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.234711 env[1123]: 2024-02-12 19:33:22.214 [INFO][3514] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--r7lmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a7c17c9-efe7-4057-8573-954bb191e1a8", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957", Pod:"csi-node-driver-r7lmb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2ae8828671", MAC:"0a:d0:98:32:94:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:22.234711 env[1123]: 2024-02-12 19:33:22.232 [INFO][3514] k8s.go 491: Wrote updated endpoint to datastore ContainerID="35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957" Namespace="calico-system" Pod="csi-node-driver-r7lmb" WorkloadEndpoint="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:22.256000 audit[3584]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3584 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:22.256000 audit[3584]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffe4c8eb4f0 a2=0 a3=7ffe4c8eb4dc items=0 ppid=3111 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.256000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:22.258925 env[1123]: time="2024-02-12T19:33:22.257381872Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:33:22.258925 env[1123]: time="2024-02-12T19:33:22.257427106Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:33:22.258925 env[1123]: time="2024-02-12T19:33:22.257437486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:33:22.258925 env[1123]: time="2024-02-12T19:33:22.257588749Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957 pid=3583 runtime=io.containerd.runc.v2 Feb 12 19:33:22.264000 audit[3559]: USER_ACCT pid=3559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.265440 sshd[3559]: Accepted publickey for core from 10.0.0.1 port 41582 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:22.265000 audit[3559]: CRED_ACQ pid=3559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.265000 audit[3559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5a4f0bf0 a2=3 a3=0 items=0 ppid=1 pid=3559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:22.266387 sshd[3559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:22.270888 systemd[1]: Started session-14.scope. Feb 12 19:33:22.272546 systemd-logind[1112]: New session 14 of user core. Feb 12 19:33:22.276794 systemd-networkd[1015]: calicc0dfd32f91: Link UP Feb 12 19:33:22.276000 audit[3559]: USER_START pid=3559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.278978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc0dfd32f91: link becomes ready Feb 12 19:33:22.278879 systemd-networkd[1015]: calicc0dfd32f91: Gained carrier Feb 12 19:33:22.278000 audit[3604]: CRED_ACQ pid=3604 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.285743 systemd[1]: Started cri-containerd-35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957.scope. Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.166 [INFO][3528] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--x9l8g-eth0 coredns-5d78c9869d- kube-system 31c6e01e-b009-45f6-ad8e-63923565f818 849 0 2024-02-12 19:32:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-x9l8g eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicc0dfd32f91 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.166 [INFO][3528] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.213 [INFO][3549] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" HandleID="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.235 [INFO][3549] ipam_plugin.go 268: Auto assigning IP ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" HandleID="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ddad0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-x9l8g", "timestamp":"2024-02-12 19:33:22.213786326 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.235 [INFO][3549] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.235 [INFO][3549] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.235 [INFO][3549] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.242 [INFO][3549] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.251 [INFO][3549] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.258 [INFO][3549] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.261 [INFO][3549] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.264 [INFO][3549] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.264 [INFO][3549] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.265 [INFO][3549] ipam.go 1682: Creating new handle: k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959 Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.268 [INFO][3549] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.271 [INFO][3549] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.271 [INFO][3549] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" host="localhost" Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.271 [INFO][3549] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:22.291227 env[1123]: 2024-02-12 19:33:22.271 [INFO][3549] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" HandleID="k8s-pod-network.d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.291760 env[1123]: 2024-02-12 19:33:22.274 [INFO][3528] k8s.go 385: Populated endpoint ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x9l8g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"31c6e01e-b009-45f6-ad8e-63923565f818", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-x9l8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicc0dfd32f91", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:22.291760 env[1123]: 2024-02-12 19:33:22.274 [INFO][3528] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.291760 env[1123]: 2024-02-12 19:33:22.274 [INFO][3528] dataplane_linux.go 68: Setting the host side veth name to calicc0dfd32f91 ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.291760 env[1123]: 2024-02-12 19:33:22.279 [INFO][3528] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.291760 env[1123]: 2024-02-12 19:33:22.280 [INFO][3528] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x9l8g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"31c6e01e-b009-45f6-ad8e-63923565f818", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959", Pod:"coredns-5d78c9869d-x9l8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicc0dfd32f91", MAC:"8a:d5:98:08:77:6d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:22.291760 env[1123]: 2024-02-12 19:33:22.289 [INFO][3528] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959" Namespace="kube-system" Pod="coredns-5d78c9869d-x9l8g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.298000 audit: BPF prog-id=156 op=LOAD Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3583 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313332643261363131373232636164333939376235333130616235 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3583 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313332643261363131373232636164333939376235333130616235 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit: BPF prog-id=157 op=LOAD Feb 12 19:33:22.299000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024770 items=0 ppid=3583 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313332643261363131373232636164333939376235333130616235 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit: BPF prog-id=158 op=LOAD Feb 12 19:33:22.299000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000247b8 items=0 ppid=3583 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313332643261363131373232636164333939376235333130616235 Feb 12 19:33:22.299000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:33:22.299000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.299000 audit: BPF prog-id=159 op=LOAD Feb 12 19:33:22.299000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024bc8 items=0 ppid=3583 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313332643261363131373232636164333939376235333130616235 Feb 12 19:33:22.301091 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:33:22.303000 audit[3625]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:22.303000 audit[3625]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffc19beeaf0 a2=0 a3=7ffc19beeadc items=0 ppid=3111 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.303000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:22.312713 env[1123]: time="2024-02-12T19:33:22.312678383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r7lmb,Uid:9a7c17c9-efe7-4057-8573-954bb191e1a8,Namespace:calico-system,Attempt:1,} returns sandbox id \"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957\"" Feb 12 19:33:22.318193 env[1123]: time="2024-02-12T19:33:22.318138800Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:33:22.318300 env[1123]: time="2024-02-12T19:33:22.318177502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:33:22.318300 env[1123]: time="2024-02-12T19:33:22.318198912Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:33:22.318462 env[1123]: time="2024-02-12T19:33:22.318432291Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959 pid=3645 runtime=io.containerd.runc.v2 Feb 12 19:33:22.329059 systemd[1]: Started cri-containerd-d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959.scope. Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit: BPF prog-id=160 op=LOAD Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3645 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393635353337386437356638346235333539656431343532316663 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3645 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393635353337386437356638346235333539656431343532316663 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.342000 audit: BPF prog-id=161 op=LOAD Feb 12 19:33:22.342000 audit[3655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000383e90 items=0 ppid=3645 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393635353337386437356638346235333539656431343532316663 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit: BPF prog-id=162 op=LOAD Feb 12 19:33:22.343000 audit[3655]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000383ed8 items=0 ppid=3645 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393635353337386437356638346235333539656431343532316663 Feb 12 19:33:22.343000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:33:22.343000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.343000 audit: BPF prog-id=163 op=LOAD Feb 12 19:33:22.343000 audit[3655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f62e8 items=0 ppid=3645 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393635353337386437356638346235333539656431343532316663 Feb 12 19:33:22.344510 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:33:22.369294 env[1123]: time="2024-02-12T19:33:22.369255138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x9l8g,Uid:31c6e01e-b009-45f6-ad8e-63923565f818,Namespace:kube-system,Attempt:1,} returns sandbox id \"d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959\"" Feb 12 19:33:22.370538 kubelet[2010]: E0212 19:33:22.370167 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:22.379536 env[1123]: time="2024-02-12T19:33:22.379492478Z" level=info msg="CreateContainer within sandbox \"d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:33:22.386015 systemd-networkd[1015]: cali474e8d53451: Gained IPv6LL Feb 12 19:33:22.401456 sshd[3559]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:22.401000 audit[3559]: USER_END pid=3559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.401000 audit[3559]: CRED_DISP pid=3559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:22.403416 env[1123]: time="2024-02-12T19:33:22.403383158Z" level=info msg="CreateContainer within sandbox \"d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5f19fc72d38c45256542338375e51e3b84bc26d669ef01249c64f9a80d68dce0\"" Feb 12 19:33:22.404170 env[1123]: time="2024-02-12T19:33:22.404150768Z" level=info msg="StartContainer for \"5f19fc72d38c45256542338375e51e3b84bc26d669ef01249c64f9a80d68dce0\"" Feb 12 19:33:22.404396 systemd-logind[1112]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:33:22.404722 systemd[1]: sshd@13-10.0.0.23:22-10.0.0.1:41582.service: Deactivated successfully. Feb 12 19:33:22.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.23:22-10.0.0.1:41582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:22.405356 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:33:22.406270 systemd-logind[1112]: Removed session 14. Feb 12 19:33:22.418164 systemd[1]: Started cri-containerd-5f19fc72d38c45256542338375e51e3b84bc26d669ef01249c64f9a80d68dce0.scope. Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.427000 audit: BPF prog-id=164 op=LOAD Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3645 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313966633732643338633435323536353432333338333735653531 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3645 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313966633732643338633435323536353432333338333735653531 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit: BPF prog-id=165 op=LOAD Feb 12 19:33:22.428000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000301640 items=0 ppid=3645 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313966633732643338633435323536353432333338333735653531 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit: BPF prog-id=166 op=LOAD Feb 12 19:33:22.428000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000301688 items=0 ppid=3645 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313966633732643338633435323536353432333338333735653531 Feb 12 19:33:22.428000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:33:22.428000 audit: BPF prog-id=165 op=UNLOAD Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:22.428000 audit: BPF prog-id=167 op=LOAD Feb 12 19:33:22.428000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301a98 items=0 ppid=3645 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:22.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313966633732643338633435323536353432333338333735653531 Feb 12 19:33:22.441304 env[1123]: time="2024-02-12T19:33:22.441260594Z" level=info msg="StartContainer for \"5f19fc72d38c45256542338375e51e3b84bc26d669ef01249c64f9a80d68dce0\" returns successfully" Feb 12 19:33:22.577834 systemd-networkd[1015]: vxlan.calico: Gained IPv6LL Feb 12 19:33:22.951478 env[1123]: time="2024-02-12T19:33:22.951436249Z" level=info msg="StopPodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\"" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:22.985 [INFO][3741] k8s.go 578: Cleaning up netns ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:22.985 [INFO][3741] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" iface="eth0" netns="/var/run/netns/cni-511cd737-a770-f30d-0bb4-273ab7b71b3b" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:22.985 [INFO][3741] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" iface="eth0" netns="/var/run/netns/cni-511cd737-a770-f30d-0bb4-273ab7b71b3b" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:22.985 [INFO][3741] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" iface="eth0" netns="/var/run/netns/cni-511cd737-a770-f30d-0bb4-273ab7b71b3b" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:22.985 [INFO][3741] k8s.go 585: Releasing IP address(es) ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:22.985 [INFO][3741] utils.go 188: Calico CNI releasing IP address ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.001 [INFO][3749] ipam_plugin.go 415: Releasing address using handleID ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.001 [INFO][3749] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.001 [INFO][3749] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.006 [WARNING][3749] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.007 [INFO][3749] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.007 [INFO][3749] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:23.009950 env[1123]: 2024-02-12 19:33:23.008 [INFO][3741] k8s.go 591: Teardown processing complete. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:23.010519 env[1123]: time="2024-02-12T19:33:23.010481465Z" level=info msg="TearDown network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" successfully" Feb 12 19:33:23.010572 env[1123]: time="2024-02-12T19:33:23.010516210Z" level=info msg="StopPodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" returns successfully" Feb 12 19:33:23.010873 kubelet[2010]: E0212 19:33:23.010842 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:23.011473 env[1123]: time="2024-02-12T19:33:23.011444331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-t4p9k,Uid:52b27ad2-d1e7-4c37-bdd0-b210e490cdc7,Namespace:kube-system,Attempt:1,}" Feb 12 19:33:23.044364 systemd[1]: run-netns-cni\x2d511cd737\x2da770\x2df30d\x2d0bb4\x2d273ab7b71b3b.mount: Deactivated successfully. Feb 12 19:33:23.076167 kubelet[2010]: E0212 19:33:23.076136 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:23.097449 kubelet[2010]: I0212 19:33:23.097201 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-x9l8g" podStartSLOduration=40.097163573 podCreationTimestamp="2024-02-12 19:32:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:33:23.085841167 +0000 UTC m=+53.216902354" watchObservedRunningTime="2024-02-12 19:33:23.097163573 +0000 UTC m=+53.228224760" Feb 12 19:33:23.103000 audit[3779]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:23.103000 audit[3779]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd71f5ad30 a2=0 a3=7ffd71f5ad1c items=0 ppid=2174 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:23.104000 audit[3779]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:23.104000 audit[3779]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd71f5ad30 a2=0 a3=31030 items=0 ppid=2174 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:23.123000 audit[3781]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:23.123000 audit[3781]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc23daaa20 a2=0 a3=7ffc23daaa0c items=0 ppid=2174 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:23.124000 audit[3781]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:23.124000 audit[3781]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc23daaa20 a2=0 a3=7ffc23daaa0c items=0 ppid=2174 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:23.132239 systemd-networkd[1015]: cali48bf7680359: Link UP Feb 12 19:33:23.135799 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:33:23.135845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali48bf7680359: link becomes ready Feb 12 19:33:23.136213 systemd-networkd[1015]: cali48bf7680359: Gained carrier Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.055 [INFO][3757] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--t4p9k-eth0 coredns-5d78c9869d- kube-system 52b27ad2-d1e7-4c37-bdd0-b210e490cdc7 879 0 2024-02-12 19:32:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-t4p9k eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali48bf7680359 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.055 [INFO][3757] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.080 [INFO][3770] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" HandleID="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.092 [INFO][3770] ipam_plugin.go 268: Auto assigning IP ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" HandleID="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050520), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-t4p9k", "timestamp":"2024-02-12 19:33:23.080226683 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.093 [INFO][3770] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.093 [INFO][3770] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.093 [INFO][3770] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.094 [INFO][3770] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.101 [INFO][3770] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.104 [INFO][3770] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.105 [INFO][3770] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.114 [INFO][3770] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.115 [INFO][3770] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.119 [INFO][3770] ipam.go 1682: Creating new handle: k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.121 [INFO][3770] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.126 [INFO][3770] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.126 [INFO][3770] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" host="localhost" Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.126 [INFO][3770] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:23.141871 env[1123]: 2024-02-12 19:33:23.126 [INFO][3770] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" HandleID="k8s-pod-network.13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.142373 env[1123]: 2024-02-12 19:33:23.128 [INFO][3757] k8s.go 385: Populated endpoint ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--t4p9k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-t4p9k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bf7680359", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:23.142373 env[1123]: 2024-02-12 19:33:23.128 [INFO][3757] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.142373 env[1123]: 2024-02-12 19:33:23.128 [INFO][3757] dataplane_linux.go 68: Setting the host side veth name to cali48bf7680359 ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.142373 env[1123]: 2024-02-12 19:33:23.132 [INFO][3757] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.142373 env[1123]: 2024-02-12 19:33:23.132 [INFO][3757] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--t4p9k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a", Pod:"coredns-5d78c9869d-t4p9k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bf7680359", MAC:"fa:a9:b0:76:68:78", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:23.142373 env[1123]: 2024-02-12 19:33:23.140 [INFO][3757] k8s.go 491: Wrote updated endpoint to datastore ContainerID="13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a" Namespace="kube-system" Pod="coredns-5d78c9869d-t4p9k" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:23.154000 audit[3800]: NETFILTER_CFG table=filter:108 family=2 entries=44 op=nft_register_chain pid=3800 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:33:23.154000 audit[3800]: SYSCALL arch=c000003e syscall=46 success=yes exit=21940 a0=3 a1=7ffebb7c1120 a2=0 a3=7ffebb7c110c items=0 ppid=3111 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.154000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:33:23.156505 env[1123]: time="2024-02-12T19:33:23.156221848Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:33:23.156505 env[1123]: time="2024-02-12T19:33:23.156260961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:33:23.156505 env[1123]: time="2024-02-12T19:33:23.156270679Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:33:23.156811 env[1123]: time="2024-02-12T19:33:23.156759998Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a pid=3803 runtime=io.containerd.runc.v2 Feb 12 19:33:23.173451 systemd[1]: Started cri-containerd-13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a.scope. Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit: BPF prog-id=168 op=LOAD Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3803 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133656635613135643034306665336339326232383462623337666265 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3803 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133656635613135643034306665336339326232383462623337666265 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit: BPF prog-id=169 op=LOAD Feb 12 19:33:23.182000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030b720 items=0 ppid=3803 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133656635613135643034306665336339326232383462623337666265 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit: BPF prog-id=170 op=LOAD Feb 12 19:33:23.182000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030b768 items=0 ppid=3803 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133656635613135643034306665336339326232383462623337666265 Feb 12 19:33:23.182000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:33:23.182000 audit: BPF prog-id=169 op=UNLOAD Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.182000 audit: BPF prog-id=171 op=LOAD Feb 12 19:33:23.182000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030bb78 items=0 ppid=3803 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133656635613135643034306665336339326232383462623337666265 Feb 12 19:33:23.184255 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:33:23.203738 env[1123]: time="2024-02-12T19:33:23.203634111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-t4p9k,Uid:52b27ad2-d1e7-4c37-bdd0-b210e490cdc7,Namespace:kube-system,Attempt:1,} returns sandbox id \"13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a\"" Feb 12 19:33:23.205619 kubelet[2010]: E0212 19:33:23.205584 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:23.209325 env[1123]: time="2024-02-12T19:33:23.209272801Z" level=info msg="CreateContainer within sandbox \"13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:33:23.220583 env[1123]: time="2024-02-12T19:33:23.220535755Z" level=info msg="CreateContainer within sandbox \"13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a530f1078f6bf56536deade17d89500ec65bca5299288c4edf3aa819a208cc1d\"" Feb 12 19:33:23.221154 env[1123]: time="2024-02-12T19:33:23.221111886Z" level=info msg="StartContainer for \"a530f1078f6bf56536deade17d89500ec65bca5299288c4edf3aa819a208cc1d\"" Feb 12 19:33:23.234141 systemd[1]: Started cri-containerd-a530f1078f6bf56536deade17d89500ec65bca5299288c4edf3aa819a208cc1d.scope. Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.244000 audit: BPF prog-id=172 op=LOAD Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3803 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333066313037386636626635363533366465616465313764383935 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3803 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333066313037386636626635363533366465616465313764383935 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit: BPF prog-id=173 op=LOAD Feb 12 19:33:23.245000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032cab0 items=0 ppid=3803 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333066313037386636626635363533366465616465313764383935 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit: BPF prog-id=174 op=LOAD Feb 12 19:33:23.245000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032caf8 items=0 ppid=3803 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333066313037386636626635363533366465616465313764383935 Feb 12 19:33:23.245000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:33:23.245000 audit: BPF prog-id=173 op=UNLOAD Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:23.245000 audit: BPF prog-id=175 op=LOAD Feb 12 19:33:23.245000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032cf08 items=0 ppid=3803 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:23.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333066313037386636626635363533366465616465313764383935 Feb 12 19:33:23.257621 env[1123]: time="2024-02-12T19:33:23.257579293Z" level=info msg="StartContainer for \"a530f1078f6bf56536deade17d89500ec65bca5299288c4edf3aa819a208cc1d\" returns successfully" Feb 12 19:33:23.921799 systemd-networkd[1015]: calif2ae8828671: Gained IPv6LL Feb 12 19:33:24.041928 systemd[1]: run-containerd-runc-k8s.io-13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a-runc.SDQnVp.mount: Deactivated successfully. Feb 12 19:33:24.082385 kubelet[2010]: E0212 19:33:24.082357 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:24.082715 kubelet[2010]: E0212 19:33:24.082357 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:24.098000 audit[3882]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:24.098000 audit[3882]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd8dbba4c0 a2=0 a3=7ffd8dbba4ac items=0 ppid=2174 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:24.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:24.099000 audit[3882]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:24.099000 audit[3882]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd8dbba4c0 a2=0 a3=7ffd8dbba4ac items=0 ppid=2174 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:24.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:24.113821 systemd-networkd[1015]: calicc0dfd32f91: Gained IPv6LL Feb 12 19:33:24.817794 systemd-networkd[1015]: cali48bf7680359: Gained IPv6LL Feb 12 19:33:25.084255 kubelet[2010]: E0212 19:33:25.084172 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:25.084534 kubelet[2010]: E0212 19:33:25.084325 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:25.142053 kubelet[2010]: I0212 19:33:25.141993 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-t4p9k" podStartSLOduration=42.14195786 podCreationTimestamp="2024-02-12 19:32:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:33:24.090504223 +0000 UTC m=+54.221565410" watchObservedRunningTime="2024-02-12 19:33:25.14195786 +0000 UTC m=+55.273019078" Feb 12 19:33:25.267000 audit[3890]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:25.267000 audit[3890]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffeb88fb10 a2=0 a3=7fffeb88fafc items=0 ppid=2174 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:25.275000 audit[3890]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:25.275000 audit[3890]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fffeb88fb10 a2=0 a3=7fffeb88fafc items=0 ppid=2174 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:25.916475 env[1123]: time="2024-02-12T19:33:25.916425612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:25.918716 env[1123]: time="2024-02-12T19:33:25.918689038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:25.920411 env[1123]: time="2024-02-12T19:33:25.920387986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:25.922043 env[1123]: time="2024-02-12T19:33:25.922018806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:25.922762 env[1123]: time="2024-02-12T19:33:25.922723648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 19:33:25.923724 env[1123]: time="2024-02-12T19:33:25.923691604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:33:25.929561 env[1123]: time="2024-02-12T19:33:25.929526351Z" level=info msg="CreateContainer within sandbox \"8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:33:25.940472 env[1123]: time="2024-02-12T19:33:25.940429278Z" level=info msg="CreateContainer within sandbox \"8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"88e95f8b45ef1cf96b0591be10bc8f52be369f3fb064cf251fc0d72cca890bfe\"" Feb 12 19:33:25.940945 env[1123]: time="2024-02-12T19:33:25.940919167Z" level=info msg="StartContainer for \"88e95f8b45ef1cf96b0591be10bc8f52be369f3fb064cf251fc0d72cca890bfe\"" Feb 12 19:33:25.962399 systemd[1]: Started cri-containerd-88e95f8b45ef1cf96b0591be10bc8f52be369f3fb064cf251fc0d72cca890bfe.scope. Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit: BPF prog-id=176 op=LOAD Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3406 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838653935663862343565663163663936623035393162653130626338 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3406 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838653935663862343565663163663936623035393162653130626338 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.973000 audit: BPF prog-id=177 op=LOAD Feb 12 19:33:25.973000 audit[3902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000384160 items=0 ppid=3406 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838653935663862343565663163663936623035393162653130626338 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit: BPF prog-id=178 op=LOAD Feb 12 19:33:25.974000 audit[3902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003841a8 items=0 ppid=3406 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838653935663862343565663163663936623035393162653130626338 Feb 12 19:33:25.974000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:33:25.974000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { perfmon } for pid=3902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit[3902]: AVC avc: denied { bpf } for pid=3902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:25.974000 audit: BPF prog-id=179 op=LOAD Feb 12 19:33:25.974000 audit[3902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003845b8 items=0 ppid=3406 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:25.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838653935663862343565663163663936623035393162653130626338 Feb 12 19:33:25.997430 env[1123]: time="2024-02-12T19:33:25.996885842Z" level=info msg="StartContainer for \"88e95f8b45ef1cf96b0591be10bc8f52be369f3fb064cf251fc0d72cca890bfe\" returns successfully" Feb 12 19:33:26.087169 kubelet[2010]: E0212 19:33:26.087125 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:26.131051 kubelet[2010]: I0212 19:33:26.131013 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-777c696c4-s2rp9" podStartSLOduration=33.614851394 podCreationTimestamp="2024-02-12 19:32:48 +0000 UTC" firstStartedPulling="2024-02-12 19:33:21.40691366 +0000 UTC m=+51.537974837" lastFinishedPulling="2024-02-12 19:33:25.923042938 +0000 UTC m=+56.054104125" observedRunningTime="2024-02-12 19:33:26.096062331 +0000 UTC m=+56.227123518" watchObservedRunningTime="2024-02-12 19:33:26.130980682 +0000 UTC m=+56.262041869" Feb 12 19:33:26.570000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:26.571695 kernel: kauditd_printk_skb: 458 callbacks suppressed Feb 12 19:33:26.571824 kernel: audit: type=1400 audit(1707766406.570:1379): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:26.570000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:26.576684 kernel: audit: type=1400 audit(1707766406.570:1380): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:26.576730 kernel: audit: type=1300 audit(1707766406.570:1379): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021620f0 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:26.570000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021620f0 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:26.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:26.582724 kernel: audit: type=1327 audit(1707766406.570:1379): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:26.582754 kernel: audit: type=1300 audit(1707766406.570:1380): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00075ea20 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:26.570000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00075ea20 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:26.585938 kernel: audit: type=1327 audit(1707766406.570:1380): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:26.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:27.089031 kubelet[2010]: E0212 19:33:27.089009 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:27.269000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.268000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.275253 kernel: audit: type=1400 audit(1707766407.269:1383): avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.275304 kernel: audit: type=1400 audit(1707766407.268:1382): avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.275337 kernel: audit: type=1400 audit(1707766407.269:1381): avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.269000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.268000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007578db0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.281157 kernel: audit: type=1300 audit(1707766407.268:1382): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007578db0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.269000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a5151d0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.269000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00ae2ce00 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:33:27.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:33:27.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:33:27.288000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.288000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a515200 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:33:27.288000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.288000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00a61c9c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:33:27.288000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:27.288000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00ae2ce20 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c1005 key=(null) Feb 12 19:33:27.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:33:27.404780 systemd[1]: Started sshd@14-10.0.0.23:22-10.0.0.1:54752.service. Feb 12 19:33:27.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.23:22-10.0.0.1:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:27.437000 audit[3954]: USER_ACCT pid=3954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:27.438239 sshd[3954]: Accepted publickey for core from 10.0.0.1 port 54752 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:27.438000 audit[3954]: CRED_ACQ pid=3954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:27.438000 audit[3954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd86200230 a2=3 a3=0 items=0 ppid=1 pid=3954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:27.438000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:27.439617 sshd[3954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:27.444234 systemd-logind[1112]: New session 15 of user core. Feb 12 19:33:27.445341 systemd[1]: Started session-15.scope. Feb 12 19:33:27.449000 audit[3954]: USER_START pid=3954 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:27.450000 audit[3956]: CRED_ACQ pid=3956 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:27.477407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2017109801.mount: Deactivated successfully. Feb 12 19:33:27.606216 sshd[3954]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:27.606000 audit[3954]: USER_END pid=3954 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:27.606000 audit[3954]: CRED_DISP pid=3954 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:27.608282 systemd[1]: sshd@14-10.0.0.23:22-10.0.0.1:54752.service: Deactivated successfully. Feb 12 19:33:27.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.23:22-10.0.0.1:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:27.609006 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:33:27.609474 systemd-logind[1112]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:33:27.610082 systemd-logind[1112]: Removed session 15. Feb 12 19:33:29.200283 env[1123]: time="2024-02-12T19:33:29.200230749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:29.202149 env[1123]: time="2024-02-12T19:33:29.202097030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:29.204371 env[1123]: time="2024-02-12T19:33:29.204343985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:29.206882 env[1123]: time="2024-02-12T19:33:29.206837553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:29.207494 env[1123]: time="2024-02-12T19:33:29.207444341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:33:29.210279 env[1123]: time="2024-02-12T19:33:29.210233043Z" level=info msg="CreateContainer within sandbox \"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:33:29.232825 env[1123]: time="2024-02-12T19:33:29.232763509Z" level=info msg="CreateContainer within sandbox \"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4766e144389bbaa51f898d89ac31bb209b6860bed134987c678c761bb289f517\"" Feb 12 19:33:29.233397 env[1123]: time="2024-02-12T19:33:29.233339659Z" level=info msg="StartContainer for \"4766e144389bbaa51f898d89ac31bb209b6860bed134987c678c761bb289f517\"" Feb 12 19:33:29.254459 systemd[1]: run-containerd-runc-k8s.io-4766e144389bbaa51f898d89ac31bb209b6860bed134987c678c761bb289f517-runc.UvHbgq.mount: Deactivated successfully. Feb 12 19:33:29.256164 systemd[1]: Started cri-containerd-4766e144389bbaa51f898d89ac31bb209b6860bed134987c678c761bb289f517.scope. Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f81c4a60608 items=0 ppid=3583 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:29.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363665313434333839626261613531663839386438396163333162 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.268000 audit: BPF prog-id=180 op=LOAD Feb 12 19:33:29.268000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00026deb8 items=0 ppid=3583 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:29.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363665313434333839626261613531663839386438396163333162 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit: BPF prog-id=181 op=LOAD Feb 12 19:33:29.269000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00026df08 items=0 ppid=3583 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:29.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363665313434333839626261613531663839386438396163333162 Feb 12 19:33:29.269000 audit: BPF prog-id=181 op=UNLOAD Feb 12 19:33:29.269000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:29.269000 audit: BPF prog-id=182 op=LOAD Feb 12 19:33:29.269000 audit[3980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00026df98 items=0 ppid=3583 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:29.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363665313434333839626261613531663839386438396163333162 Feb 12 19:33:29.283249 env[1123]: time="2024-02-12T19:33:29.283201917Z" level=info msg="StartContainer for \"4766e144389bbaa51f898d89ac31bb209b6860bed134987c678c761bb289f517\" returns successfully" Feb 12 19:33:29.284348 env[1123]: time="2024-02-12T19:33:29.284327599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:33:29.942392 env[1123]: time="2024-02-12T19:33:29.942349003Z" level=info msg="StopPodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\"" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.973 [WARNING][4025] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0", GenerateName:"calico-kube-controllers-777c696c4-", Namespace:"calico-system", SelfLink:"", UID:"c18c8620-8870-44d8-816c-61566497ac58", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"777c696c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8", Pod:"calico-kube-controllers-777c696c4-s2rp9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali474e8d53451", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.973 [INFO][4025] k8s.go 578: Cleaning up netns ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.973 [INFO][4025] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" iface="eth0" netns="" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.973 [INFO][4025] k8s.go 585: Releasing IP address(es) ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.974 [INFO][4025] utils.go 188: Calico CNI releasing IP address ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.991 [INFO][4035] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.991 [INFO][4035] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.991 [INFO][4035] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.997 [WARNING][4035] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.997 [INFO][4035] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:29.999 [INFO][4035] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.003305 env[1123]: 2024-02-12 19:33:30.001 [INFO][4025] k8s.go 591: Teardown processing complete. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.003822 env[1123]: time="2024-02-12T19:33:30.003364564Z" level=info msg="TearDown network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" successfully" Feb 12 19:33:30.003822 env[1123]: time="2024-02-12T19:33:30.003396273Z" level=info msg="StopPodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" returns successfully" Feb 12 19:33:30.005991 env[1123]: time="2024-02-12T19:33:30.005955364Z" level=info msg="RemovePodSandbox for \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\"" Feb 12 19:33:30.006046 env[1123]: time="2024-02-12T19:33:30.005986612Z" level=info msg="Forcibly stopping sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\"" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.038 [WARNING][4058] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0", GenerateName:"calico-kube-controllers-777c696c4-", Namespace:"calico-system", SelfLink:"", UID:"c18c8620-8870-44d8-816c-61566497ac58", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"777c696c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8563360e0c6a19f4e55669db9a2c5477cb93590bafe849ce06442bc3715443c8", Pod:"calico-kube-controllers-777c696c4-s2rp9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali474e8d53451", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.038 [INFO][4058] k8s.go 578: Cleaning up netns ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.038 [INFO][4058] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" iface="eth0" netns="" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.038 [INFO][4058] k8s.go 585: Releasing IP address(es) ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.038 [INFO][4058] utils.go 188: Calico CNI releasing IP address ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.055 [INFO][4066] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.055 [INFO][4066] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.055 [INFO][4066] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.065 [WARNING][4066] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.065 [INFO][4066] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" HandleID="k8s-pod-network.3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Workload="localhost-k8s-calico--kube--controllers--777c696c4--s2rp9-eth0" Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.067 [INFO][4066] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.072198 env[1123]: 2024-02-12 19:33:30.068 [INFO][4058] k8s.go 591: Teardown processing complete. ContainerID="3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae" Feb 12 19:33:30.072816 env[1123]: time="2024-02-12T19:33:30.072230778Z" level=info msg="TearDown network for sandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" successfully" Feb 12 19:33:30.077448 env[1123]: time="2024-02-12T19:33:30.076068467Z" level=info msg="RemovePodSandbox \"3e4661e6d121009dc0492d9e4ccce19275469bbcf340ad2d88b61f8f91736bae\" returns successfully" Feb 12 19:33:30.077448 env[1123]: time="2024-02-12T19:33:30.076560530Z" level=info msg="StopPodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\"" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.115 [WARNING][4096] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--r7lmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a7c17c9-efe7-4057-8573-954bb191e1a8", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957", Pod:"csi-node-driver-r7lmb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2ae8828671", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.115 [INFO][4096] k8s.go 578: Cleaning up netns ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.116 [INFO][4096] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" iface="eth0" netns="" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.116 [INFO][4096] k8s.go 585: Releasing IP address(es) ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.116 [INFO][4096] utils.go 188: Calico CNI releasing IP address ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.135 [INFO][4103] ipam_plugin.go 415: Releasing address using handleID ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.135 [INFO][4103] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.135 [INFO][4103] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.141 [WARNING][4103] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.141 [INFO][4103] ipam_plugin.go 443: Releasing address using workloadID ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.143 [INFO][4103] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.145911 env[1123]: 2024-02-12 19:33:30.144 [INFO][4096] k8s.go 591: Teardown processing complete. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.146474 env[1123]: time="2024-02-12T19:33:30.145947532Z" level=info msg="TearDown network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" successfully" Feb 12 19:33:30.146474 env[1123]: time="2024-02-12T19:33:30.145986455Z" level=info msg="StopPodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" returns successfully" Feb 12 19:33:30.146555 env[1123]: time="2024-02-12T19:33:30.146504216Z" level=info msg="RemovePodSandbox for \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\"" Feb 12 19:33:30.146599 env[1123]: time="2024-02-12T19:33:30.146548288Z" level=info msg="Forcibly stopping sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\"" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.178 [WARNING][4126] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--r7lmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a7c17c9-efe7-4057-8573-954bb191e1a8", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957", Pod:"csi-node-driver-r7lmb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2ae8828671", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.179 [INFO][4126] k8s.go 578: Cleaning up netns ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.179 [INFO][4126] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" iface="eth0" netns="" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.179 [INFO][4126] k8s.go 585: Releasing IP address(es) ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.179 [INFO][4126] utils.go 188: Calico CNI releasing IP address ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.197 [INFO][4134] ipam_plugin.go 415: Releasing address using handleID ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.197 [INFO][4134] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.197 [INFO][4134] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.204 [WARNING][4134] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.204 [INFO][4134] ipam_plugin.go 443: Releasing address using workloadID ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" HandleID="k8s-pod-network.136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Workload="localhost-k8s-csi--node--driver--r7lmb-eth0" Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.206 [INFO][4134] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.209156 env[1123]: 2024-02-12 19:33:30.207 [INFO][4126] k8s.go 591: Teardown processing complete. ContainerID="136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c" Feb 12 19:33:30.209156 env[1123]: time="2024-02-12T19:33:30.209115116Z" level=info msg="TearDown network for sandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" successfully" Feb 12 19:33:30.212432 env[1123]: time="2024-02-12T19:33:30.212399016Z" level=info msg="RemovePodSandbox \"136674c3a71ce8a14a44b9078c0b3f5c7d8c92b00207b7b5b71e384426eb172c\" returns successfully" Feb 12 19:33:30.212980 env[1123]: time="2024-02-12T19:33:30.212955520Z" level=info msg="StopPodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\"" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.246 [WARNING][4157] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--t4p9k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a", Pod:"coredns-5d78c9869d-t4p9k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bf7680359", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.246 [INFO][4157] k8s.go 578: Cleaning up netns ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.246 [INFO][4157] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" iface="eth0" netns="" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.246 [INFO][4157] k8s.go 585: Releasing IP address(es) ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.246 [INFO][4157] utils.go 188: Calico CNI releasing IP address ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.265 [INFO][4165] ipam_plugin.go 415: Releasing address using handleID ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.265 [INFO][4165] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.265 [INFO][4165] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.273 [WARNING][4165] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.273 [INFO][4165] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.274 [INFO][4165] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.277749 env[1123]: 2024-02-12 19:33:30.276 [INFO][4157] k8s.go 591: Teardown processing complete. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.278272 env[1123]: time="2024-02-12T19:33:30.278226049Z" level=info msg="TearDown network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" successfully" Feb 12 19:33:30.278272 env[1123]: time="2024-02-12T19:33:30.278263188Z" level=info msg="StopPodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" returns successfully" Feb 12 19:33:30.278849 env[1123]: time="2024-02-12T19:33:30.278813792Z" level=info msg="RemovePodSandbox for \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\"" Feb 12 19:33:30.278895 env[1123]: time="2024-02-12T19:33:30.278857023Z" level=info msg="Forcibly stopping sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\"" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.310 [WARNING][4188] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--t4p9k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"52b27ad2-d1e7-4c37-bdd0-b210e490cdc7", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"13ef5a15d040fe3c92b284bb37fbece0323766202ea9e39a5afd3eabf98b084a", Pod:"coredns-5d78c9869d-t4p9k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali48bf7680359", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.310 [INFO][4188] k8s.go 578: Cleaning up netns ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.310 [INFO][4188] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" iface="eth0" netns="" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.310 [INFO][4188] k8s.go 585: Releasing IP address(es) ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.310 [INFO][4188] utils.go 188: Calico CNI releasing IP address ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.327 [INFO][4196] ipam_plugin.go 415: Releasing address using handleID ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.327 [INFO][4196] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.328 [INFO][4196] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.334 [WARNING][4196] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.334 [INFO][4196] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" HandleID="k8s-pod-network.5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Workload="localhost-k8s-coredns--5d78c9869d--t4p9k-eth0" Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.336 [INFO][4196] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.339291 env[1123]: 2024-02-12 19:33:30.338 [INFO][4188] k8s.go 591: Teardown processing complete. ContainerID="5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90" Feb 12 19:33:30.339780 env[1123]: time="2024-02-12T19:33:30.339306428Z" level=info msg="TearDown network for sandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" successfully" Feb 12 19:33:30.342350 env[1123]: time="2024-02-12T19:33:30.342327386Z" level=info msg="RemovePodSandbox \"5009b00ec5fdf9e8cb630f318e7783d5894ae4ea50cf0d7ddf93cdf4cb4abf90\" returns successfully" Feb 12 19:33:30.342853 env[1123]: time="2024-02-12T19:33:30.342824418Z" level=info msg="StopPodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\"" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.375 [WARNING][4219] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x9l8g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"31c6e01e-b009-45f6-ad8e-63923565f818", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959", Pod:"coredns-5d78c9869d-x9l8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicc0dfd32f91", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.376 [INFO][4219] k8s.go 578: Cleaning up netns ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.376 [INFO][4219] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" iface="eth0" netns="" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.376 [INFO][4219] k8s.go 585: Releasing IP address(es) ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.376 [INFO][4219] utils.go 188: Calico CNI releasing IP address ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.395 [INFO][4226] ipam_plugin.go 415: Releasing address using handleID ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.395 [INFO][4226] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.395 [INFO][4226] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.403 [WARNING][4226] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.403 [INFO][4226] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.404 [INFO][4226] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.407523 env[1123]: 2024-02-12 19:33:30.406 [INFO][4219] k8s.go 591: Teardown processing complete. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.408122 env[1123]: time="2024-02-12T19:33:30.407561446Z" level=info msg="TearDown network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" successfully" Feb 12 19:33:30.408122 env[1123]: time="2024-02-12T19:33:30.407592975Z" level=info msg="StopPodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" returns successfully" Feb 12 19:33:30.408181 env[1123]: time="2024-02-12T19:33:30.408132477Z" level=info msg="RemovePodSandbox for \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\"" Feb 12 19:33:30.408212 env[1123]: time="2024-02-12T19:33:30.408172342Z" level=info msg="Forcibly stopping sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\"" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.440 [WARNING][4249] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x9l8g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"31c6e01e-b009-45f6-ad8e-63923565f818", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 32, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d09655378d75f84b5359ed14521fcb5d065b582c63526f3a74927dcf79a15959", Pod:"coredns-5d78c9869d-x9l8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicc0dfd32f91", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.440 [INFO][4249] k8s.go 578: Cleaning up netns ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.440 [INFO][4249] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" iface="eth0" netns="" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.440 [INFO][4249] k8s.go 585: Releasing IP address(es) ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.440 [INFO][4249] utils.go 188: Calico CNI releasing IP address ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.458 [INFO][4257] ipam_plugin.go 415: Releasing address using handleID ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.458 [INFO][4257] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.458 [INFO][4257] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.465 [WARNING][4257] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.465 [INFO][4257] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" HandleID="k8s-pod-network.9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Workload="localhost-k8s-coredns--5d78c9869d--x9l8g-eth0" Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.466 [INFO][4257] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:33:30.469359 env[1123]: 2024-02-12 19:33:30.467 [INFO][4249] k8s.go 591: Teardown processing complete. ContainerID="9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6" Feb 12 19:33:30.469359 env[1123]: time="2024-02-12T19:33:30.469325678Z" level=info msg="TearDown network for sandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" successfully" Feb 12 19:33:30.472619 env[1123]: time="2024-02-12T19:33:30.472579172Z" level=info msg="RemovePodSandbox \"9cb7b7517e30471d8f3641e84a5c9a315ee7d04385b401398d4570772d4de1d6\" returns successfully" Feb 12 19:33:31.145322 env[1123]: time="2024-02-12T19:33:31.145260136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:31.147234 env[1123]: time="2024-02-12T19:33:31.147199845Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:31.149091 env[1123]: time="2024-02-12T19:33:31.149062536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:31.151409 env[1123]: time="2024-02-12T19:33:31.151372741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:33:31.152102 env[1123]: time="2024-02-12T19:33:31.152052516Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:33:31.154059 env[1123]: time="2024-02-12T19:33:31.154035138Z" level=info msg="CreateContainer within sandbox \"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:33:31.165975 env[1123]: time="2024-02-12T19:33:31.165940630Z" level=info msg="CreateContainer within sandbox \"35132d2a611722cad3997b5310ab542ff8773898b018d1468e73c350281f9957\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5ef98c976c2a5b3a8db8611d9cc6aead143180ffcf60ffbd7150d632e20b2110\"" Feb 12 19:33:31.166450 env[1123]: time="2024-02-12T19:33:31.166415668Z" level=info msg="StartContainer for \"5ef98c976c2a5b3a8db8611d9cc6aead143180ffcf60ffbd7150d632e20b2110\"" Feb 12 19:33:31.184153 systemd[1]: Started cri-containerd-5ef98c976c2a5b3a8db8611d9cc6aead143180ffcf60ffbd7150d632e20b2110.scope. Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f03f0466768 items=0 ppid=3583 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:31.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565663938633937366332613562336138646238363131643963633661 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.194000 audit: BPF prog-id=183 op=LOAD Feb 12 19:33:31.194000 audit[4271]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dfdf8 items=0 ppid=3583 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:31.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565663938633937366332613562336138646238363131643963633661 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit: BPF prog-id=184 op=LOAD Feb 12 19:33:31.195000 audit[4271]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dfe48 items=0 ppid=3583 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:31.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565663938633937366332613562336138646238363131643963633661 Feb 12 19:33:31.195000 audit: BPF prog-id=184 op=UNLOAD Feb 12 19:33:31.195000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:33:31.195000 audit: BPF prog-id=185 op=LOAD Feb 12 19:33:31.195000 audit[4271]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dfed8 items=0 ppid=3583 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:31.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565663938633937366332613562336138646238363131643963633661 Feb 12 19:33:31.208518 env[1123]: time="2024-02-12T19:33:31.208456560Z" level=info msg="StartContainer for \"5ef98c976c2a5b3a8db8611d9cc6aead143180ffcf60ffbd7150d632e20b2110\" returns successfully" Feb 12 19:33:32.038876 kubelet[2010]: I0212 19:33:32.038830 2010 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:33:32.051731 kubelet[2010]: I0212 19:33:32.051702 2010 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:33:32.130185 kubelet[2010]: I0212 19:33:32.129819 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-r7lmb" podStartSLOduration=35.292171215 podCreationTimestamp="2024-02-12 19:32:48 +0000 UTC" firstStartedPulling="2024-02-12 19:33:22.314726066 +0000 UTC m=+52.445787253" lastFinishedPulling="2024-02-12 19:33:31.15229274 +0000 UTC m=+61.283353927" observedRunningTime="2024-02-12 19:33:32.12928769 +0000 UTC m=+62.260348877" watchObservedRunningTime="2024-02-12 19:33:32.129737889 +0000 UTC m=+62.260799077" Feb 12 19:33:32.610990 systemd[1]: Started sshd@15-10.0.0.23:22-10.0.0.1:54766.service. Feb 12 19:33:32.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.23:22-10.0.0.1:54766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:32.611973 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 12 19:33:32.612027 kernel: audit: type=1130 audit(1707766412.610:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.23:22-10.0.0.1:54766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:32.643000 audit[4302]: USER_ACCT pid=4302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.644883 sshd[4302]: Accepted publickey for core from 10.0.0.1 port 54766 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:32.646182 sshd[4302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:32.645000 audit[4302]: CRED_ACQ pid=4302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.650247 kernel: audit: type=1101 audit(1707766412.643:1409): pid=4302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.650296 kernel: audit: type=1103 audit(1707766412.645:1410): pid=4302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.650315 kernel: audit: type=1006 audit(1707766412.645:1411): pid=4302 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:33:32.649243 systemd-logind[1112]: New session 16 of user core. Feb 12 19:33:32.650003 systemd[1]: Started session-16.scope. Feb 12 19:33:32.651164 kernel: audit: type=1300 audit(1707766412.645:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe46ba37b0 a2=3 a3=0 items=0 ppid=1 pid=4302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:32.645000 audit[4302]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe46ba37b0 a2=3 a3=0 items=0 ppid=1 pid=4302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:32.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:32.654750 kernel: audit: type=1327 audit(1707766412.645:1411): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:32.654792 kernel: audit: type=1105 audit(1707766412.652:1412): pid=4302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.652000 audit[4302]: USER_START pid=4302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.657534 kernel: audit: type=1103 audit(1707766412.653:1413): pid=4304 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.653000 audit[4304]: CRED_ACQ pid=4304 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.752245 sshd[4302]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:32.752000 audit[4302]: USER_END pid=4302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.754477 systemd[1]: sshd@15-10.0.0.23:22-10.0.0.1:54766.service: Deactivated successfully. Feb 12 19:33:32.755157 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:33:32.755696 systemd-logind[1112]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:33:32.752000 audit[4302]: CRED_DISP pid=4302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.756355 systemd-logind[1112]: Removed session 16. Feb 12 19:33:32.758879 kernel: audit: type=1106 audit(1707766412.752:1414): pid=4302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.758999 kernel: audit: type=1104 audit(1707766412.752:1415): pid=4302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:32.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.23:22-10.0.0.1:54766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:37.756831 systemd[1]: Started sshd@16-10.0.0.23:22-10.0.0.1:41138.service. Feb 12 19:33:37.757847 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:33:37.757899 kernel: audit: type=1130 audit(1707766417.755:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.23:22-10.0.0.1:41138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:37.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.23:22-10.0.0.1:41138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:37.786000 audit[4317]: USER_ACCT pid=4317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.788471 sshd[4317]: Accepted publickey for core from 10.0.0.1 port 41138 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:37.790138 sshd[4317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:37.788000 audit[4317]: CRED_ACQ pid=4317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.793359 kernel: audit: type=1101 audit(1707766417.786:1418): pid=4317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.793458 kernel: audit: type=1103 audit(1707766417.788:1419): pid=4317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.793486 kernel: audit: type=1006 audit(1707766417.788:1420): pid=4317 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:33:37.794575 systemd[1]: Started session-17.scope. Feb 12 19:33:37.797567 kernel: audit: type=1300 audit(1707766417.788:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1398820 a2=3 a3=0 items=0 ppid=1 pid=4317 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:37.788000 audit[4317]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1398820 a2=3 a3=0 items=0 ppid=1 pid=4317 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:37.794934 systemd-logind[1112]: New session 17 of user core. Feb 12 19:33:37.788000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:37.799697 kernel: audit: type=1327 audit(1707766417.788:1420): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:37.798000 audit[4317]: USER_START pid=4317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.799000 audit[4319]: CRED_ACQ pid=4319 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.805307 kernel: audit: type=1105 audit(1707766417.798:1421): pid=4317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.805348 kernel: audit: type=1103 audit(1707766417.799:1422): pid=4319 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.896798 sshd[4317]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:37.895000 audit[4317]: USER_END pid=4317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.898634 systemd[1]: sshd@16-10.0.0.23:22-10.0.0.1:41138.service: Deactivated successfully. Feb 12 19:33:37.899357 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:33:37.900309 systemd-logind[1112]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:33:37.895000 audit[4317]: CRED_DISP pid=4317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.901044 systemd-logind[1112]: Removed session 17. Feb 12 19:33:37.902797 kernel: audit: type=1106 audit(1707766417.895:1423): pid=4317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.902852 kernel: audit: type=1104 audit(1707766417.895:1424): pid=4317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:37.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.23:22-10.0.0.1:41138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:40.692000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:40.692000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fe2ac0 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:40.692000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:40.693000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:40.693000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:40.693000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0008c1340 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:40.693000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fe2b00 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:40.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:40.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:40.694000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:33:40.694000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000fe2b40 a2=fc6 a3=0 items=0 ppid=1739 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c749 key=(null) Feb 12 19:33:40.694000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:33:42.900986 systemd[1]: Started sshd@17-10.0.0.23:22-10.0.0.1:41144.service. Feb 12 19:33:42.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.23:22-10.0.0.1:41144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:42.901809 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:33:42.901996 kernel: audit: type=1130 audit(1707766422.900:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.23:22-10.0.0.1:41144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:42.975000 audit[4361]: USER_ACCT pid=4361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.975977 sshd[4361]: Accepted publickey for core from 10.0.0.1 port 41144 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:42.977989 sshd[4361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:42.977000 audit[4361]: CRED_ACQ pid=4361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.981367 systemd-logind[1112]: New session 18 of user core. Feb 12 19:33:42.982173 kernel: audit: type=1101 audit(1707766422.975:1431): pid=4361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.982207 kernel: audit: type=1103 audit(1707766422.977:1432): pid=4361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.982225 kernel: audit: type=1006 audit(1707766422.977:1433): pid=4361 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 19:33:42.982301 systemd[1]: Started session-18.scope. Feb 12 19:33:42.977000 audit[4361]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c2f7280 a2=3 a3=0 items=0 ppid=1 pid=4361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:42.987404 kernel: audit: type=1300 audit(1707766422.977:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c2f7280 a2=3 a3=0 items=0 ppid=1 pid=4361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:42.987534 kernel: audit: type=1327 audit(1707766422.977:1433): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:42.977000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:42.986000 audit[4361]: USER_START pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.992073 kernel: audit: type=1105 audit(1707766422.986:1434): pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.992129 kernel: audit: type=1103 audit(1707766422.987:1435): pid=4363 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:42.987000 audit[4363]: CRED_ACQ pid=4363 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:43.090938 sshd[4361]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:43.091000 audit[4361]: USER_END pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:43.093343 systemd[1]: sshd@17-10.0.0.23:22-10.0.0.1:41144.service: Deactivated successfully. Feb 12 19:33:43.094050 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:33:43.094534 systemd-logind[1112]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:33:43.095153 systemd-logind[1112]: Removed session 18. Feb 12 19:33:43.091000 audit[4361]: CRED_DISP pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:43.110697 kernel: audit: type=1106 audit(1707766423.091:1436): pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:43.110758 kernel: audit: type=1104 audit(1707766423.091:1437): pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:43.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.23:22-10.0.0.1:41144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:46.627055 kubelet[2010]: E0212 19:33:46.627028 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:48.095764 systemd[1]: Started sshd@18-10.0.0.23:22-10.0.0.1:47078.service. Feb 12 19:33:48.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.23:22-10.0.0.1:47078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:48.099022 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:33:48.099089 kernel: audit: type=1130 audit(1707766428.095:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.23:22-10.0.0.1:47078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:48.126000 audit[4400]: USER_ACCT pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.126923 sshd[4400]: Accepted publickey for core from 10.0.0.1 port 47078 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:48.129704 kernel: audit: type=1101 audit(1707766428.126:1440): pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.129763 kernel: audit: type=1103 audit(1707766428.129:1441): pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.129000 audit[4400]: CRED_ACQ pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.130027 sshd[4400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:48.134108 kernel: audit: type=1006 audit(1707766428.129:1442): pid=4400 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 19:33:48.134200 kernel: audit: type=1300 audit(1707766428.129:1442): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3fc63ce0 a2=3 a3=0 items=0 ppid=1 pid=4400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:48.129000 audit[4400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3fc63ce0 a2=3 a3=0 items=0 ppid=1 pid=4400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:48.134497 systemd-logind[1112]: New session 19 of user core. Feb 12 19:33:48.135653 systemd[1]: Started session-19.scope. Feb 12 19:33:48.137011 kernel: audit: type=1327 audit(1707766428.129:1442): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:48.129000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:48.139000 audit[4400]: USER_START pid=4400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.142000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.145904 kernel: audit: type=1105 audit(1707766428.139:1443): pid=4400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.145955 kernel: audit: type=1103 audit(1707766428.142:1444): pid=4402 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.247438 sshd[4400]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:48.247000 audit[4400]: USER_END pid=4400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.250868 systemd[1]: sshd@18-10.0.0.23:22-10.0.0.1:47078.service: Deactivated successfully. Feb 12 19:33:48.247000 audit[4400]: CRED_DISP pid=4400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.251535 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:33:48.253140 systemd[1]: Started sshd@19-10.0.0.23:22-10.0.0.1:47084.service. Feb 12 19:33:48.253724 kernel: audit: type=1106 audit(1707766428.247:1445): pid=4400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.254006 kernel: audit: type=1104 audit(1707766428.247:1446): pid=4400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.23:22-10.0.0.1:47078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:48.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.23:22-10.0.0.1:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:48.255054 systemd-logind[1112]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:33:48.255845 systemd-logind[1112]: Removed session 19. Feb 12 19:33:48.286000 audit[4413]: USER_ACCT pid=4413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.287141 sshd[4413]: Accepted publickey for core from 10.0.0.1 port 47084 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:48.286000 audit[4413]: CRED_ACQ pid=4413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.286000 audit[4413]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe286fcb30 a2=3 a3=0 items=0 ppid=1 pid=4413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:48.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:48.287871 sshd[4413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:48.291557 systemd-logind[1112]: New session 20 of user core. Feb 12 19:33:48.292652 systemd[1]: Started session-20.scope. Feb 12 19:33:48.296000 audit[4413]: USER_START pid=4413 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.297000 audit[4415]: CRED_ACQ pid=4415 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.604925 sshd[4413]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:48.605000 audit[4413]: USER_END pid=4413 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.605000 audit[4413]: CRED_DISP pid=4413 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.608800 systemd[1]: Started sshd@20-10.0.0.23:22-10.0.0.1:47090.service. Feb 12 19:33:48.609251 systemd[1]: sshd@19-10.0.0.23:22-10.0.0.1:47084.service: Deactivated successfully. Feb 12 19:33:48.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.23:22-10.0.0.1:47090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:48.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.23:22-10.0.0.1:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:48.609849 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:33:48.610692 systemd-logind[1112]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:33:48.611607 systemd-logind[1112]: Removed session 20. Feb 12 19:33:48.641000 audit[4423]: USER_ACCT pid=4423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.642827 sshd[4423]: Accepted publickey for core from 10.0.0.1 port 47090 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:48.642000 audit[4423]: CRED_ACQ pid=4423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.642000 audit[4423]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff40edf0b0 a2=3 a3=0 items=0 ppid=1 pid=4423 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:48.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:48.643793 sshd[4423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:48.647238 systemd-logind[1112]: New session 21 of user core. Feb 12 19:33:48.648034 systemd[1]: Started session-21.scope. Feb 12 19:33:48.650000 audit[4423]: USER_START pid=4423 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:48.651000 audit[4426]: CRED_ACQ pid=4426 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:49.782000 audit[4458]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:49.782000 audit[4458]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffcb37eb8a0 a2=0 a3=7ffcb37eb88c items=0 ppid=2174 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:49.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:49.783000 audit[4458]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:49.783000 audit[4458]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcb37eb8a0 a2=0 a3=31030 items=0 ppid=2174 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:49.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:49.797000 audit[4460]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:49.797000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffccd999d20 a2=0 a3=7ffccd999d0c items=0 ppid=2174 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:49.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:49.803082 sshd[4423]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:49.804000 audit[4423]: USER_END pid=4423 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:49.806790 systemd[1]: Started sshd@21-10.0.0.23:22-10.0.0.1:47092.service. Feb 12 19:33:49.804000 audit[4423]: CRED_DISP pid=4423 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:49.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.23:22-10.0.0.1:47092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:49.807338 systemd[1]: sshd@20-10.0.0.23:22-10.0.0.1:47090.service: Deactivated successfully. Feb 12 19:33:49.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.23:22-10.0.0.1:47090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:49.808071 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:33:49.808683 systemd-logind[1112]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:33:49.809608 systemd-logind[1112]: Removed session 21. Feb 12 19:33:49.797000 audit[4460]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:49.797000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffccd999d20 a2=0 a3=31030 items=0 ppid=2174 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:49.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:49.844000 audit[4462]: USER_ACCT pid=4462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:49.845132 sshd[4462]: Accepted publickey for core from 10.0.0.1 port 47092 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:49.845000 audit[4462]: CRED_ACQ pid=4462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:49.845000 audit[4462]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f33c7a0 a2=3 a3=0 items=0 ppid=1 pid=4462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:49.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:49.846279 sshd[4462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:49.849386 systemd-logind[1112]: New session 22 of user core. Feb 12 19:33:49.850209 systemd[1]: Started session-22.scope. Feb 12 19:33:49.852000 audit[4462]: USER_START pid=4462 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:49.854000 audit[4465]: CRED_ACQ pid=4465 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.186729 sshd[4462]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:50.187000 audit[4462]: USER_END pid=4462 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.187000 audit[4462]: CRED_DISP pid=4462 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.23:22-10.0.0.1:47092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:50.189662 systemd[1]: sshd@21-10.0.0.23:22-10.0.0.1:47092.service: Deactivated successfully. Feb 12 19:33:50.190363 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:33:50.191080 systemd-logind[1112]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:33:50.192418 systemd[1]: Started sshd@22-10.0.0.23:22-10.0.0.1:47102.service. Feb 12 19:33:50.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.23:22-10.0.0.1:47102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:50.193721 systemd-logind[1112]: Removed session 22. Feb 12 19:33:50.228000 audit[4474]: USER_ACCT pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.229473 sshd[4474]: Accepted publickey for core from 10.0.0.1 port 47102 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:50.229000 audit[4474]: CRED_ACQ pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.229000 audit[4474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde9d4be40 a2=3 a3=0 items=0 ppid=1 pid=4474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:50.229000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:50.230537 sshd[4474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:50.234439 systemd-logind[1112]: New session 23 of user core. Feb 12 19:33:50.235191 systemd[1]: Started session-23.scope. Feb 12 19:33:50.240000 audit[4474]: USER_START pid=4474 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.241000 audit[4476]: CRED_ACQ pid=4476 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.343847 sshd[4474]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:50.344000 audit[4474]: USER_END pid=4474 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.344000 audit[4474]: CRED_DISP pid=4474 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:50.346145 systemd[1]: sshd@22-10.0.0.23:22-10.0.0.1:47102.service: Deactivated successfully. Feb 12 19:33:50.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.23:22-10.0.0.1:47102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:50.347021 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:33:50.347607 systemd-logind[1112]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:33:50.348323 systemd-logind[1112]: Removed session 23. Feb 12 19:33:54.950429 kubelet[2010]: E0212 19:33:54.950392 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:33:55.348889 systemd[1]: Started sshd@23-10.0.0.23:22-10.0.0.1:47110.service. Feb 12 19:33:55.350214 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:33:55.350334 kernel: audit: type=1130 audit(1707766435.348:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.23:22-10.0.0.1:47110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:55.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.23:22-10.0.0.1:47110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:55.379000 audit[4488]: USER_ACCT pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.380114 sshd[4488]: Accepted publickey for core from 10.0.0.1 port 47110 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:33:55.382118 sshd[4488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:33:55.381000 audit[4488]: CRED_ACQ pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.386088 kernel: audit: type=1101 audit(1707766435.379:1489): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.386160 kernel: audit: type=1103 audit(1707766435.381:1490): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.386194 kernel: audit: type=1006 audit(1707766435.381:1491): pid=4488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:33:55.385747 systemd-logind[1112]: New session 24 of user core. Feb 12 19:33:55.386818 systemd[1]: Started session-24.scope. Feb 12 19:33:55.381000 audit[4488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7082c8b0 a2=3 a3=0 items=0 ppid=1 pid=4488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:55.391686 kernel: audit: type=1300 audit(1707766435.381:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7082c8b0 a2=3 a3=0 items=0 ppid=1 pid=4488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:55.391745 kernel: audit: type=1327 audit(1707766435.381:1491): proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:55.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:33:55.390000 audit[4488]: USER_START pid=4488 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.392000 audit[4490]: CRED_ACQ pid=4490 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.397940 kernel: audit: type=1105 audit(1707766435.390:1492): pid=4488 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.397998 kernel: audit: type=1103 audit(1707766435.392:1493): pid=4490 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.494345 sshd[4488]: pam_unix(sshd:session): session closed for user core Feb 12 19:33:55.494000 audit[4488]: USER_END pid=4488 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.496662 systemd[1]: sshd@23-10.0.0.23:22-10.0.0.1:47110.service: Deactivated successfully. Feb 12 19:33:55.497371 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:33:55.494000 audit[4488]: CRED_DISP pid=4488 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.500478 kernel: audit: type=1106 audit(1707766435.494:1494): pid=4488 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.500521 kernel: audit: type=1104 audit(1707766435.494:1495): pid=4488 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:33:55.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.23:22-10.0.0.1:47110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:33:55.500919 systemd-logind[1112]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:33:55.501474 systemd-logind[1112]: Removed session 24. Feb 12 19:33:56.430000 audit[4501]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:56.430000 audit[4501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe63d3e6e0 a2=0 a3=7ffe63d3e6cc items=0 ppid=2174 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:56.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:56.433000 audit[4501]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:33:56.433000 audit[4501]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffe63d3e6e0 a2=0 a3=7ffe63d3e6cc items=0 ppid=2174 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:33:56.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:33:58.950958 kubelet[2010]: E0212 19:33:58.950914 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:34:00.498727 systemd[1]: Started sshd@24-10.0.0.23:22-10.0.0.1:36650.service. Feb 12 19:34:00.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.23:22-10.0.0.1:36650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:00.501847 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:34:00.501893 kernel: audit: type=1130 audit(1707766440.497:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.23:22-10.0.0.1:36650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:00.528000 audit[4510]: USER_ACCT pid=4510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.530221 sshd[4510]: Accepted publickey for core from 10.0.0.1 port 36650 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:34:00.532172 sshd[4510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:34:00.530000 audit[4510]: CRED_ACQ pid=4510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.535779 systemd-logind[1112]: New session 25 of user core. Feb 12 19:34:00.536303 kernel: audit: type=1101 audit(1707766440.528:1500): pid=4510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.536355 kernel: audit: type=1103 audit(1707766440.530:1501): pid=4510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.536379 kernel: audit: type=1006 audit(1707766440.530:1502): pid=4510 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:34:00.536516 systemd[1]: Started session-25.scope. Feb 12 19:34:00.530000 audit[4510]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc533ec780 a2=3 a3=0 items=0 ppid=1 pid=4510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:00.540882 kernel: audit: type=1300 audit(1707766440.530:1502): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc533ec780 a2=3 a3=0 items=0 ppid=1 pid=4510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:00.540950 kernel: audit: type=1327 audit(1707766440.530:1502): proctitle=737368643A20636F7265205B707269765D Feb 12 19:34:00.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:34:00.541828 kernel: audit: type=1105 audit(1707766440.539:1503): pid=4510 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.539000 audit[4510]: USER_START pid=4510 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.540000 audit[4512]: CRED_ACQ pid=4512 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.547017 kernel: audit: type=1103 audit(1707766440.540:1504): pid=4512 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.644224 sshd[4510]: pam_unix(sshd:session): session closed for user core Feb 12 19:34:00.643000 audit[4510]: USER_END pid=4510 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.646852 systemd[1]: sshd@24-10.0.0.23:22-10.0.0.1:36650.service: Deactivated successfully. Feb 12 19:34:00.647618 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:34:00.648263 systemd-logind[1112]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:34:00.643000 audit[4510]: CRED_DISP pid=4510 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.648901 systemd-logind[1112]: Removed session 25. Feb 12 19:34:00.651379 kernel: audit: type=1106 audit(1707766440.643:1505): pid=4510 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.651464 kernel: audit: type=1104 audit(1707766440.643:1506): pid=4510 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:00.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.23:22-10.0.0.1:36650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:03.575540 kubelet[2010]: I0212 19:34:03.575494 2010 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:34:03.582719 systemd[1]: Created slice kubepods-besteffort-pod2c55b5b8_5201_447d_a953_1ccf5d7c7148.slice. Feb 12 19:34:03.582000 audit[4526]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:03.582000 audit[4526]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffec41377d0 a2=0 a3=7ffec41377bc items=0 ppid=2174 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:03.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:03.583000 audit[4526]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:03.583000 audit[4526]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffec41377d0 a2=0 a3=7ffec41377bc items=0 ppid=2174 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:03.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:03.594000 audit[4528]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:03.594000 audit[4528]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff657d4b50 a2=0 a3=7fff657d4b3c items=0 ppid=2174 pid=4528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:03.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:03.595000 audit[4528]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:03.595000 audit[4528]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff657d4b50 a2=0 a3=7fff657d4b3c items=0 ppid=2174 pid=4528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:03.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:03.694555 kubelet[2010]: I0212 19:34:03.694505 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2c55b5b8-5201-447d-a953-1ccf5d7c7148-calico-apiserver-certs\") pod \"calico-apiserver-766d686c76-4cjpz\" (UID: \"2c55b5b8-5201-447d-a953-1ccf5d7c7148\") " pod="calico-apiserver/calico-apiserver-766d686c76-4cjpz" Feb 12 19:34:03.694555 kubelet[2010]: I0212 19:34:03.694562 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcwf8\" (UniqueName: \"kubernetes.io/projected/2c55b5b8-5201-447d-a953-1ccf5d7c7148-kube-api-access-zcwf8\") pod \"calico-apiserver-766d686c76-4cjpz\" (UID: \"2c55b5b8-5201-447d-a953-1ccf5d7c7148\") " pod="calico-apiserver/calico-apiserver-766d686c76-4cjpz" Feb 12 19:34:03.885960 env[1123]: time="2024-02-12T19:34:03.885854436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-766d686c76-4cjpz,Uid:2c55b5b8-5201-447d-a953-1ccf5d7c7148,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:34:04.249088 systemd-networkd[1015]: cali1f7f949b16e: Link UP Feb 12 19:34:04.251400 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:34:04.251916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f7f949b16e: link becomes ready Feb 12 19:34:04.251980 systemd-networkd[1015]: cali1f7f949b16e: Gained carrier Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.171 [INFO][4532] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0 calico-apiserver-766d686c76- calico-apiserver 2c55b5b8-5201-447d-a953-1ccf5d7c7148 1163 0 2024-02-12 19:34:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:766d686c76 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-766d686c76-4cjpz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1f7f949b16e [] []}} ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.171 [INFO][4532] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.199 [INFO][4544] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" HandleID="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Workload="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.207 [INFO][4544] ipam_plugin.go 268: Auto assigning IP ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" HandleID="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Workload="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004dbde0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-766d686c76-4cjpz", "timestamp":"2024-02-12 19:34:04.199083341 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.207 [INFO][4544] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.207 [INFO][4544] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.207 [INFO][4544] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.209 [INFO][4544] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.213 [INFO][4544] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.216 [INFO][4544] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.218 [INFO][4544] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.220 [INFO][4544] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.220 [INFO][4544] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.222 [INFO][4544] ipam.go 1682: Creating new handle: k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779 Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.226 [INFO][4544] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.245 [INFO][4544] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.245 [INFO][4544] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" host="localhost" Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.245 [INFO][4544] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:34:04.325030 env[1123]: 2024-02-12 19:34:04.245 [INFO][4544] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" HandleID="k8s-pod-network.ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Workload="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.325629 env[1123]: 2024-02-12 19:34:04.247 [INFO][4532] k8s.go 385: Populated endpoint ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0", GenerateName:"calico-apiserver-766d686c76-", Namespace:"calico-apiserver", SelfLink:"", UID:"2c55b5b8-5201-447d-a953-1ccf5d7c7148", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 34, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"766d686c76", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-766d686c76-4cjpz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1f7f949b16e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:34:04.325629 env[1123]: 2024-02-12 19:34:04.247 [INFO][4532] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.325629 env[1123]: 2024-02-12 19:34:04.247 [INFO][4532] dataplane_linux.go 68: Setting the host side veth name to cali1f7f949b16e ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.325629 env[1123]: 2024-02-12 19:34:04.252 [INFO][4532] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.325629 env[1123]: 2024-02-12 19:34:04.252 [INFO][4532] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0", GenerateName:"calico-apiserver-766d686c76-", Namespace:"calico-apiserver", SelfLink:"", UID:"2c55b5b8-5201-447d-a953-1ccf5d7c7148", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 34, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"766d686c76", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779", Pod:"calico-apiserver-766d686c76-4cjpz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1f7f949b16e", MAC:"36:64:d8:c1:91:94", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:34:04.325629 env[1123]: 2024-02-12 19:34:04.322 [INFO][4532] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779" Namespace="calico-apiserver" Pod="calico-apiserver-766d686c76-4cjpz" WorkloadEndpoint="localhost-k8s-calico--apiserver--766d686c76--4cjpz-eth0" Feb 12 19:34:04.341000 audit[4571]: NETFILTER_CFG table=filter:123 family=2 entries=55 op=nft_register_chain pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:34:04.341000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffc14183eb0 a2=0 a3=7ffc14183e9c items=0 ppid=3111 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:04.341000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:34:04.379586 env[1123]: time="2024-02-12T19:34:04.379495995Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:34:04.379586 env[1123]: time="2024-02-12T19:34:04.379538966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:34:04.379821 env[1123]: time="2024-02-12T19:34:04.379549195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:34:04.380067 env[1123]: time="2024-02-12T19:34:04.380022695Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779 pid=4579 runtime=io.containerd.runc.v2 Feb 12 19:34:04.390575 systemd[1]: Started cri-containerd-ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779.scope. Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit: BPF prog-id=186 op=LOAD Feb 12 19:34:04.400000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.400000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4579 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:04.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306130313137656266396233353230636363333936656631393564 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4579 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:04.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306130313137656266396233353230636363333936656631393564 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit: BPF prog-id=187 op=LOAD Feb 12 19:34:04.401000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000255ce0 items=0 ppid=4579 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:04.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306130313137656266396233353230636363333936656631393564 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit: BPF prog-id=188 op=LOAD Feb 12 19:34:04.401000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000255d28 items=0 ppid=4579 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:04.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306130313137656266396233353230636363333936656631393564 Feb 12 19:34:04.401000 audit: BPF prog-id=188 op=UNLOAD Feb 12 19:34:04.401000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:04.401000 audit: BPF prog-id=189 op=LOAD Feb 12 19:34:04.401000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da138 items=0 ppid=4579 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:04.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163306130313137656266396233353230636363333936656631393564 Feb 12 19:34:04.403572 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:34:04.424345 env[1123]: time="2024-02-12T19:34:04.424296463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-766d686c76-4cjpz,Uid:2c55b5b8-5201-447d-a953-1ccf5d7c7148,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779\"" Feb 12 19:34:04.425925 env[1123]: time="2024-02-12T19:34:04.425899658Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:34:05.648724 systemd[1]: Started sshd@25-10.0.0.23:22-10.0.0.1:36666.service. Feb 12 19:34:05.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.23:22-10.0.0.1:36666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:05.652661 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 12 19:34:05.652747 kernel: audit: type=1130 audit(1707766445.647:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.23:22-10.0.0.1:36666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:05.680000 audit[4612]: USER_ACCT pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.682773 sshd[4612]: Accepted publickey for core from 10.0.0.1 port 36666 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:34:05.684977 sshd[4612]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:34:05.682000 audit[4612]: CRED_ACQ pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.692353 kernel: audit: type=1101 audit(1707766445.680:1532): pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.692485 kernel: audit: type=1103 audit(1707766445.682:1533): pid=4612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.691746 systemd[1]: Started session-26.scope. Feb 12 19:34:05.692710 systemd-logind[1112]: New session 26 of user core. Feb 12 19:34:05.682000 audit[4612]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96ddf000 a2=3 a3=0 items=0 ppid=1 pid=4612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:05.698522 kernel: audit: type=1006 audit(1707766445.682:1534): pid=4612 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:34:05.698573 kernel: audit: type=1300 audit(1707766445.682:1534): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96ddf000 a2=3 a3=0 items=0 ppid=1 pid=4612 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:05.698589 kernel: audit: type=1327 audit(1707766445.682:1534): proctitle=737368643A20636F7265205B707269765D Feb 12 19:34:05.682000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:34:05.696000 audit[4612]: USER_START pid=4612 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.702113 kernel: audit: type=1105 audit(1707766445.696:1535): pid=4612 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.702157 kernel: audit: type=1103 audit(1707766445.697:1536): pid=4614 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.697000 audit[4614]: CRED_ACQ pid=4614 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.796614 sshd[4612]: pam_unix(sshd:session): session closed for user core Feb 12 19:34:05.795000 audit[4612]: USER_END pid=4612 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.798559 systemd[1]: sshd@25-10.0.0.23:22-10.0.0.1:36666.service: Deactivated successfully. Feb 12 19:34:05.799239 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:34:05.799780 systemd-logind[1112]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:34:05.795000 audit[4612]: CRED_DISP pid=4612 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.800541 systemd-logind[1112]: Removed session 26. Feb 12 19:34:05.802769 kernel: audit: type=1106 audit(1707766445.795:1537): pid=4612 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.802814 kernel: audit: type=1104 audit(1707766445.795:1538): pid=4612 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:05.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.23:22-10.0.0.1:36666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:06.161997 systemd-networkd[1015]: cali1f7f949b16e: Gained IPv6LL Feb 12 19:34:06.951644 kubelet[2010]: E0212 19:34:06.951606 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:34:09.165169 env[1123]: time="2024-02-12T19:34:09.165114881Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:34:09.167280 env[1123]: time="2024-02-12T19:34:09.167235564Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:34:09.169436 env[1123]: time="2024-02-12T19:34:09.169385542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:34:09.171269 env[1123]: time="2024-02-12T19:34:09.171245731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:34:09.172170 env[1123]: time="2024-02-12T19:34:09.172123095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:34:09.174221 env[1123]: time="2024-02-12T19:34:09.174185907Z" level=info msg="CreateContainer within sandbox \"ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:34:09.186171 env[1123]: time="2024-02-12T19:34:09.186120165Z" level=info msg="CreateContainer within sandbox \"ac0a0117ebf9b3520ccc396ef195da6647c11a59b374d2653aaf058029e9e779\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"843021d10881d49b4248d8a6c2ffc39fdee8284eb8902af51581c128aed3978f\"" Feb 12 19:34:09.186604 env[1123]: time="2024-02-12T19:34:09.186567113Z" level=info msg="StartContainer for \"843021d10881d49b4248d8a6c2ffc39fdee8284eb8902af51581c128aed3978f\"" Feb 12 19:34:09.204588 systemd[1]: Started cri-containerd-843021d10881d49b4248d8a6c2ffc39fdee8284eb8902af51581c128aed3978f.scope. Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit: BPF prog-id=190 op=LOAD Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4579 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333032316431303838316434396234323438643861366332666663 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4579 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333032316431303838316434396234323438643861366332666663 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit: BPF prog-id=191 op=LOAD Feb 12 19:34:09.214000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3dc0 items=0 ppid=4579 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333032316431303838316434396234323438643861366332666663 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit: BPF prog-id=192 op=LOAD Feb 12 19:34:09.214000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e08 items=0 ppid=4579 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333032316431303838316434396234323438643861366332666663 Feb 12 19:34:09.214000 audit: BPF prog-id=192 op=UNLOAD Feb 12 19:34:09.214000 audit: BPF prog-id=191 op=UNLOAD Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { perfmon } for pid=4653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit[4653]: AVC avc: denied { bpf } for pid=4653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:34:09.214000 audit: BPF prog-id=193 op=LOAD Feb 12 19:34:09.214000 audit[4653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0218 items=0 ppid=4579 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834333032316431303838316434396234323438643861366332666663 Feb 12 19:34:09.412403 env[1123]: time="2024-02-12T19:34:09.412322697Z" level=info msg="StartContainer for \"843021d10881d49b4248d8a6c2ffc39fdee8284eb8902af51581c128aed3978f\" returns successfully" Feb 12 19:34:09.691000 audit[4687]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:09.691000 audit[4687]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff14d5d910 a2=0 a3=7fff14d5d8fc items=0 ppid=2174 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:09.693000 audit[4687]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:09.693000 audit[4687]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff14d5d910 a2=0 a3=7fff14d5d8fc items=0 ppid=2174 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:09.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:09.714000 audit[4664]: AVC avc: denied { watch } for pid=4664 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_34_03.2477576420/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c768 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c490,c768 tclass=file permissive=0 Feb 12 19:34:09.714000 audit[4664]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d23560 a2=fc6 a3=0 items=0 ppid=4579 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c768 key=(null) Feb 12 19:34:09.714000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:34:10.184404 kubelet[2010]: I0212 19:34:10.184382 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-766d686c76-4cjpz" podStartSLOduration=2.43685689 podCreationTimestamp="2024-02-12 19:34:03 +0000 UTC" firstStartedPulling="2024-02-12 19:34:04.425543411 +0000 UTC m=+94.556604588" lastFinishedPulling="2024-02-12 19:34:09.173030957 +0000 UTC m=+99.304092144" observedRunningTime="2024-02-12 19:34:10.184033236 +0000 UTC m=+100.315094424" watchObservedRunningTime="2024-02-12 19:34:10.184344446 +0000 UTC m=+100.315405633" Feb 12 19:34:10.193000 audit[4690]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:10.193000 audit[4690]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd49da8990 a2=0 a3=7ffd49da897c items=0 ppid=2174 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:10.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:10.194000 audit[4690]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:34:10.194000 audit[4690]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd49da8990 a2=0 a3=7ffd49da897c items=0 ppid=2174 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:10.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:34:10.800635 systemd[1]: Started sshd@26-10.0.0.23:22-10.0.0.1:45372.service. Feb 12 19:34:10.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.23:22-10.0.0.1:45372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:10.804126 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 12 19:34:10.804198 kernel: audit: type=1130 audit(1707766450.800:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.23:22-10.0.0.1:45372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:10.832000 audit[4692]: USER_ACCT pid=4692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.833698 sshd[4692]: Accepted publickey for core from 10.0.0.1 port 45372 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:34:10.836688 kernel: audit: type=1101 audit(1707766450.832:1564): pid=4692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.836000 audit[4692]: CRED_ACQ pid=4692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.837168 sshd[4692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:34:10.840705 systemd-logind[1112]: New session 27 of user core. Feb 12 19:34:10.841718 systemd[1]: Started session-27.scope. Feb 12 19:34:10.841871 kernel: audit: type=1103 audit(1707766450.836:1565): pid=4692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.841918 kernel: audit: type=1006 audit(1707766450.836:1566): pid=4692 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 19:34:10.841936 kernel: audit: type=1300 audit(1707766450.836:1566): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e948690 a2=3 a3=0 items=0 ppid=1 pid=4692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:10.836000 audit[4692]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e948690 a2=3 a3=0 items=0 ppid=1 pid=4692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:34:10.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:34:10.846420 kernel: audit: type=1327 audit(1707766450.836:1566): proctitle=737368643A20636F7265205B707269765D Feb 12 19:34:10.846493 kernel: audit: type=1105 audit(1707766450.844:1567): pid=4692 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.844000 audit[4692]: USER_START pid=4692 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.849405 kernel: audit: type=1103 audit(1707766450.845:1568): pid=4694 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.845000 audit[4694]: CRED_ACQ pid=4694 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.943718 sshd[4692]: pam_unix(sshd:session): session closed for user core Feb 12 19:34:10.944000 audit[4692]: USER_END pid=4692 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.945902 systemd[1]: sshd@26-10.0.0.23:22-10.0.0.1:45372.service: Deactivated successfully. Feb 12 19:34:10.946718 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:34:10.947633 systemd-logind[1112]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:34:10.944000 audit[4692]: CRED_DISP pid=4692 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.948297 systemd-logind[1112]: Removed session 27. Feb 12 19:34:10.950075 kernel: audit: type=1106 audit(1707766450.944:1569): pid=4692 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.950142 kernel: audit: type=1104 audit(1707766450.944:1570): pid=4692 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:34:10.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.23:22-10.0.0.1:45372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:34:11.951290 kubelet[2010]: E0212 19:34:11.951254 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"