Feb 12 19:43:19.796489 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:43:19.796513 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:43:19.796526 kernel: BIOS-provided physical RAM map: Feb 12 19:43:19.796534 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:43:19.796542 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 12 19:43:19.796549 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 12 19:43:19.796559 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 12 19:43:19.796567 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 12 19:43:19.796575 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 12 19:43:19.796584 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 12 19:43:19.796591 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 12 19:43:19.796599 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 12 19:43:19.796606 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 12 19:43:19.796614 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 12 19:43:19.796624 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 12 19:43:19.796634 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 12 19:43:19.796643 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 12 19:43:19.796651 kernel: NX (Execute Disable) protection: active Feb 12 19:43:19.796660 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 12 19:43:19.796668 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 12 19:43:19.796677 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 12 19:43:19.796685 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 12 19:43:19.796693 kernel: extended physical RAM map: Feb 12 19:43:19.796702 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:43:19.796710 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 12 19:43:19.796730 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 12 19:43:19.796739 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 12 19:43:19.796747 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 12 19:43:19.796756 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 12 19:43:19.796794 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 12 19:43:19.796803 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable Feb 12 19:43:19.796811 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable Feb 12 19:43:19.796819 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable Feb 12 19:43:19.796827 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable Feb 12 19:43:19.796835 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable Feb 12 19:43:19.796843 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 12 19:43:19.796854 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 12 19:43:19.796863 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 12 19:43:19.796871 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 12 19:43:19.796880 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 12 19:43:19.796892 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 12 19:43:19.796901 kernel: efi: EFI v2.70 by EDK II Feb 12 19:43:19.796911 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 12 19:43:19.796921 kernel: random: crng init done Feb 12 19:43:19.796930 kernel: SMBIOS 2.8 present. Feb 12 19:43:19.796939 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 12 19:43:19.796948 kernel: Hypervisor detected: KVM Feb 12 19:43:19.796957 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:43:19.796967 kernel: kvm-clock: cpu 0, msr 4dfaa001, primary cpu clock Feb 12 19:43:19.796976 kernel: kvm-clock: using sched offset of 4391868107 cycles Feb 12 19:43:19.796986 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:43:19.796995 kernel: tsc: Detected 2794.750 MHz processor Feb 12 19:43:19.797007 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:43:19.797016 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:43:19.797024 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 12 19:43:19.797033 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:43:19.797043 kernel: Using GB pages for direct mapping Feb 12 19:43:19.797052 kernel: Secure boot disabled Feb 12 19:43:19.797061 kernel: ACPI: Early table checksum verification disabled Feb 12 19:43:19.797070 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 12 19:43:19.797080 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:43:19.797092 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:43:19.797101 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:43:19.797110 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 12 19:43:19.797120 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:43:19.797129 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:43:19.797139 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:43:19.797148 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 12 19:43:19.797158 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 12 19:43:19.797167 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 12 19:43:19.797179 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 12 19:43:19.797188 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 12 19:43:19.797198 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 12 19:43:19.797207 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 12 19:43:19.797216 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 12 19:43:19.797224 kernel: No NUMA configuration found Feb 12 19:43:19.797233 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 12 19:43:19.797242 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 12 19:43:19.797251 kernel: Zone ranges: Feb 12 19:43:19.797262 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:43:19.797271 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 12 19:43:19.797281 kernel: Normal empty Feb 12 19:43:19.797290 kernel: Movable zone start for each node Feb 12 19:43:19.797300 kernel: Early memory node ranges Feb 12 19:43:19.797309 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:43:19.797318 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 12 19:43:19.797328 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 12 19:43:19.797337 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 12 19:43:19.797348 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 12 19:43:19.797358 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 12 19:43:19.797367 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 12 19:43:19.797377 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:43:19.797386 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:43:19.797395 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 12 19:43:19.797404 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:43:19.797414 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 12 19:43:19.797423 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 12 19:43:19.797433 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 12 19:43:19.797442 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 19:43:19.797451 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:43:19.797460 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:43:19.797470 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:43:19.797479 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:43:19.797489 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:43:19.797498 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:43:19.797507 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:43:19.797518 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:43:19.797528 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:43:19.797537 kernel: TSC deadline timer available Feb 12 19:43:19.797546 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 12 19:43:19.797556 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 12 19:43:19.797565 kernel: kvm-guest: setup PV sched yield Feb 12 19:43:19.797574 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 12 19:43:19.797584 kernel: Booting paravirtualized kernel on KVM Feb 12 19:43:19.797593 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:43:19.797603 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 12 19:43:19.797614 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 12 19:43:19.797623 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 12 19:43:19.797638 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 12 19:43:19.797648 kernel: kvm-guest: setup async PF for cpu 0 Feb 12 19:43:19.797658 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Feb 12 19:43:19.797667 kernel: kvm-guest: PV spinlocks enabled Feb 12 19:43:19.797676 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:43:19.797686 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 12 19:43:19.797696 kernel: Policy zone: DMA32 Feb 12 19:43:19.797707 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:43:19.797717 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:43:19.797738 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:43:19.797748 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:43:19.797758 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:43:19.797784 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166304K reserved, 0K cma-reserved) Feb 12 19:43:19.797803 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:43:19.797815 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:43:19.797826 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:43:19.797836 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:43:19.797846 kernel: rcu: RCU event tracing is enabled. Feb 12 19:43:19.797856 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:43:19.797866 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:43:19.797876 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:43:19.797886 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:43:19.797895 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:43:19.797906 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 12 19:43:19.797916 kernel: Console: colour dummy device 80x25 Feb 12 19:43:19.797925 kernel: printk: console [ttyS0] enabled Feb 12 19:43:19.797935 kernel: ACPI: Core revision 20210730 Feb 12 19:43:19.797945 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:43:19.797955 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:43:19.797965 kernel: x2apic enabled Feb 12 19:43:19.797974 kernel: Switched APIC routing to physical x2apic. Feb 12 19:43:19.797984 kernel: kvm-guest: setup PV IPIs Feb 12 19:43:19.797996 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:43:19.798006 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 19:43:19.798016 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 12 19:43:19.798026 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 12 19:43:19.798036 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 12 19:43:19.798046 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 12 19:43:19.798056 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:43:19.798066 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:43:19.798076 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:43:19.798088 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:43:19.798098 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 12 19:43:19.798107 kernel: RETBleed: Mitigation: untrained return thunk Feb 12 19:43:19.798116 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:43:19.798126 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:43:19.798136 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:43:19.798146 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:43:19.798156 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:43:19.798165 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:43:19.798178 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:43:19.798187 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:43:19.798197 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:43:19.798207 kernel: LSM: Security Framework initializing Feb 12 19:43:19.798217 kernel: SELinux: Initializing. Feb 12 19:43:19.798226 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:43:19.798237 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:43:19.798247 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 12 19:43:19.798258 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 12 19:43:19.798268 kernel: ... version: 0 Feb 12 19:43:19.798277 kernel: ... bit width: 48 Feb 12 19:43:19.798287 kernel: ... generic registers: 6 Feb 12 19:43:19.798297 kernel: ... value mask: 0000ffffffffffff Feb 12 19:43:19.798306 kernel: ... max period: 00007fffffffffff Feb 12 19:43:19.798316 kernel: ... fixed-purpose events: 0 Feb 12 19:43:19.798325 kernel: ... event mask: 000000000000003f Feb 12 19:43:19.798335 kernel: signal: max sigframe size: 1776 Feb 12 19:43:19.798344 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:43:19.798356 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:43:19.798365 kernel: x86: Booting SMP configuration: Feb 12 19:43:19.798374 kernel: .... node #0, CPUs: #1 Feb 12 19:43:19.798382 kernel: kvm-clock: cpu 1, msr 4dfaa041, secondary cpu clock Feb 12 19:43:19.798391 kernel: kvm-guest: setup async PF for cpu 1 Feb 12 19:43:19.798400 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Feb 12 19:43:19.798409 kernel: #2 Feb 12 19:43:19.798419 kernel: kvm-clock: cpu 2, msr 4dfaa081, secondary cpu clock Feb 12 19:43:19.798428 kernel: kvm-guest: setup async PF for cpu 2 Feb 12 19:43:19.798439 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Feb 12 19:43:19.798448 kernel: #3 Feb 12 19:43:19.798457 kernel: kvm-clock: cpu 3, msr 4dfaa0c1, secondary cpu clock Feb 12 19:43:19.798465 kernel: kvm-guest: setup async PF for cpu 3 Feb 12 19:43:19.798474 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Feb 12 19:43:19.798483 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:43:19.798492 kernel: smpboot: Max logical packages: 1 Feb 12 19:43:19.798501 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 12 19:43:19.798511 kernel: devtmpfs: initialized Feb 12 19:43:19.798522 kernel: x86/mm: Memory block size: 128MB Feb 12 19:43:19.798532 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 12 19:43:19.798542 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 12 19:43:19.798552 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 12 19:43:19.798562 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 12 19:43:19.798572 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 12 19:43:19.798581 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:43:19.798591 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:43:19.798601 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:43:19.798612 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:43:19.798622 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:43:19.798631 kernel: audit: type=2000 audit(1707766999.409:1): state=initialized audit_enabled=0 res=1 Feb 12 19:43:19.798640 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:43:19.798649 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:43:19.798658 kernel: cpuidle: using governor menu Feb 12 19:43:19.798667 kernel: ACPI: bus type PCI registered Feb 12 19:43:19.798676 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:43:19.798699 kernel: dca service started, version 1.12.1 Feb 12 19:43:19.798711 kernel: PCI: Using configuration type 1 for base access Feb 12 19:43:19.798735 kernel: PCI: Using configuration type 1 for extended access Feb 12 19:43:19.798747 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:43:19.798758 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:43:19.798817 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:43:19.798827 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:43:19.798837 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:43:19.798846 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:43:19.798856 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:43:19.798868 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:43:19.798877 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:43:19.798887 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:43:19.798896 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:43:19.798917 kernel: ACPI: Interpreter enabled Feb 12 19:43:19.798926 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 19:43:19.798942 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:43:19.798952 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:43:19.798962 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:43:19.798974 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:43:19.799164 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:43:19.799187 kernel: acpiphp: Slot [3] registered Feb 12 19:43:19.799199 kernel: acpiphp: Slot [4] registered Feb 12 19:43:19.799210 kernel: acpiphp: Slot [5] registered Feb 12 19:43:19.799226 kernel: acpiphp: Slot [6] registered Feb 12 19:43:19.799245 kernel: acpiphp: Slot [7] registered Feb 12 19:43:19.799255 kernel: acpiphp: Slot [8] registered Feb 12 19:43:19.799271 kernel: acpiphp: Slot [9] registered Feb 12 19:43:19.799284 kernel: acpiphp: Slot [10] registered Feb 12 19:43:19.799292 kernel: acpiphp: Slot [11] registered Feb 12 19:43:19.799313 kernel: acpiphp: Slot [12] registered Feb 12 19:43:19.799323 kernel: acpiphp: Slot [13] registered Feb 12 19:43:19.799338 kernel: acpiphp: Slot [14] registered Feb 12 19:43:19.799349 kernel: acpiphp: Slot [15] registered Feb 12 19:43:19.799358 kernel: acpiphp: Slot [16] registered Feb 12 19:43:19.799367 kernel: acpiphp: Slot [17] registered Feb 12 19:43:19.799388 kernel: acpiphp: Slot [18] registered Feb 12 19:43:19.799402 kernel: acpiphp: Slot [19] registered Feb 12 19:43:19.799417 kernel: acpiphp: Slot [20] registered Feb 12 19:43:19.799426 kernel: acpiphp: Slot [21] registered Feb 12 19:43:19.799436 kernel: acpiphp: Slot [22] registered Feb 12 19:43:19.799446 kernel: acpiphp: Slot [23] registered Feb 12 19:43:19.799455 kernel: acpiphp: Slot [24] registered Feb 12 19:43:19.799465 kernel: acpiphp: Slot [25] registered Feb 12 19:43:19.799474 kernel: acpiphp: Slot [26] registered Feb 12 19:43:19.799484 kernel: acpiphp: Slot [27] registered Feb 12 19:43:19.799493 kernel: acpiphp: Slot [28] registered Feb 12 19:43:19.799505 kernel: acpiphp: Slot [29] registered Feb 12 19:43:19.799514 kernel: acpiphp: Slot [30] registered Feb 12 19:43:19.799523 kernel: acpiphp: Slot [31] registered Feb 12 19:43:19.799544 kernel: PCI host bridge to bus 0000:00 Feb 12 19:43:19.799662 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:43:19.799802 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:43:19.800017 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:43:19.800136 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 12 19:43:19.800212 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 12 19:43:19.800284 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:43:19.800401 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:43:19.800510 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:43:19.800626 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:43:19.800718 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 12 19:43:19.800831 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:43:19.800914 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:43:19.800997 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:43:19.801089 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:43:19.801180 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:43:19.801279 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 19:43:19.801353 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 19:43:19.801428 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 12 19:43:19.801496 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 12 19:43:19.801562 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 12 19:43:19.801628 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 12 19:43:19.801696 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 12 19:43:19.801783 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:43:19.801863 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:43:19.801932 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 12 19:43:19.802003 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 12 19:43:19.802070 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 12 19:43:19.802144 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:43:19.802213 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:43:19.802283 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 12 19:43:19.802352 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 12 19:43:19.802429 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:43:19.802499 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 19:43:19.802566 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 12 19:43:19.802632 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 12 19:43:19.802698 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 12 19:43:19.802707 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:43:19.802717 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:43:19.802731 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:43:19.802739 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:43:19.802746 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:43:19.802753 kernel: iommu: Default domain type: Translated Feb 12 19:43:19.802760 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:43:19.802840 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:43:19.802907 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:43:19.802973 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:43:19.802985 kernel: vgaarb: loaded Feb 12 19:43:19.802993 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:43:19.803000 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:43:19.803007 kernel: PTP clock support registered Feb 12 19:43:19.803014 kernel: Registered efivars operations Feb 12 19:43:19.803021 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:43:19.803029 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:43:19.803036 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 12 19:43:19.803043 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 12 19:43:19.803052 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff] Feb 12 19:43:19.803059 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff] Feb 12 19:43:19.803065 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 12 19:43:19.803073 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 12 19:43:19.803080 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:43:19.803087 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:43:19.803095 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:43:19.803102 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:43:19.803110 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:43:19.803119 kernel: pnp: PnP ACPI init Feb 12 19:43:19.803190 kernel: pnp 00:02: [dma 2] Feb 12 19:43:19.803201 kernel: pnp: PnP ACPI: found 6 devices Feb 12 19:43:19.803208 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:43:19.803215 kernel: NET: Registered PF_INET protocol family Feb 12 19:43:19.803223 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:43:19.803230 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:43:19.803237 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:43:19.803247 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:43:19.803254 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:43:19.803261 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:43:19.803268 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:43:19.803275 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:43:19.803283 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:43:19.803290 kernel: NET: Registered PF_XDP protocol family Feb 12 19:43:19.803359 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 12 19:43:19.803441 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 12 19:43:19.803503 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:43:19.803562 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:43:19.803621 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:43:19.803679 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 12 19:43:19.803746 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 12 19:43:19.803827 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:43:19.803894 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:43:19.803965 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:43:19.803974 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:43:19.803982 kernel: Initialise system trusted keyrings Feb 12 19:43:19.803989 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:43:19.803997 kernel: Key type asymmetric registered Feb 12 19:43:19.804005 kernel: Asymmetric key parser 'x509' registered Feb 12 19:43:19.804012 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:43:19.804019 kernel: io scheduler mq-deadline registered Feb 12 19:43:19.804027 kernel: io scheduler kyber registered Feb 12 19:43:19.804036 kernel: io scheduler bfq registered Feb 12 19:43:19.804043 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:43:19.804051 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:43:19.804059 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 19:43:19.804066 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:43:19.804074 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:43:19.804081 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:43:19.804089 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:43:19.804096 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:43:19.804105 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:43:19.804113 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:43:19.804184 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 12 19:43:19.804248 kernel: rtc_cmos 00:05: registered as rtc0 Feb 12 19:43:19.804313 kernel: rtc_cmos 00:05: setting system clock to 2024-02-12T19:43:19 UTC (1707766999) Feb 12 19:43:19.804373 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 12 19:43:19.804382 kernel: efifb: probing for efifb Feb 12 19:43:19.804390 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 12 19:43:19.804398 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 12 19:43:19.804405 kernel: efifb: scrolling: redraw Feb 12 19:43:19.804413 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:43:19.804420 kernel: Console: switching to colour frame buffer device 160x50 Feb 12 19:43:19.804428 kernel: fb0: EFI VGA frame buffer device Feb 12 19:43:19.804438 kernel: pstore: Registered efi as persistent store backend Feb 12 19:43:19.804445 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:43:19.804452 kernel: Segment Routing with IPv6 Feb 12 19:43:19.804460 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:43:19.804467 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:43:19.804475 kernel: Key type dns_resolver registered Feb 12 19:43:19.804482 kernel: IPI shorthand broadcast: enabled Feb 12 19:43:19.804489 kernel: sched_clock: Marking stable (381148874, 89398742)->(478100078, -7552462) Feb 12 19:43:19.804497 kernel: registered taskstats version 1 Feb 12 19:43:19.804504 kernel: Loading compiled-in X.509 certificates Feb 12 19:43:19.804513 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:43:19.804521 kernel: Key type .fscrypt registered Feb 12 19:43:19.804528 kernel: Key type fscrypt-provisioning registered Feb 12 19:43:19.804535 kernel: pstore: Using crash dump compression: deflate Feb 12 19:43:19.804543 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:43:19.804550 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:43:19.804558 kernel: ima: No architecture policies found Feb 12 19:43:19.804565 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:43:19.804574 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:43:19.804583 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:43:19.804590 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:43:19.804598 kernel: Run /init as init process Feb 12 19:43:19.804605 kernel: with arguments: Feb 12 19:43:19.804612 kernel: /init Feb 12 19:43:19.804619 kernel: with environment: Feb 12 19:43:19.804627 kernel: HOME=/ Feb 12 19:43:19.804634 kernel: TERM=linux Feb 12 19:43:19.804641 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:43:19.804654 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:43:19.804665 systemd[1]: Detected virtualization kvm. Feb 12 19:43:19.804672 systemd[1]: Detected architecture x86-64. Feb 12 19:43:19.804680 systemd[1]: Running in initrd. Feb 12 19:43:19.804688 systemd[1]: No hostname configured, using default hostname. Feb 12 19:43:19.804695 systemd[1]: Hostname set to . Feb 12 19:43:19.804703 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:43:19.804713 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:43:19.804727 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:43:19.804735 systemd[1]: Reached target cryptsetup.target. Feb 12 19:43:19.804743 systemd[1]: Reached target paths.target. Feb 12 19:43:19.804751 systemd[1]: Reached target slices.target. Feb 12 19:43:19.804758 systemd[1]: Reached target swap.target. Feb 12 19:43:19.804775 systemd[1]: Reached target timers.target. Feb 12 19:43:19.804785 systemd[1]: Listening on iscsid.socket. Feb 12 19:43:19.804793 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:43:19.804801 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:43:19.804809 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:43:19.804817 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:43:19.804825 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:43:19.804833 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:43:19.804840 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:43:19.804848 systemd[1]: Reached target sockets.target. Feb 12 19:43:19.804857 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:43:19.804865 systemd[1]: Finished network-cleanup.service. Feb 12 19:43:19.804872 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:43:19.804880 systemd[1]: Starting systemd-journald.service... Feb 12 19:43:19.804888 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:43:19.804895 systemd[1]: Starting systemd-resolved.service... Feb 12 19:43:19.804903 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:43:19.804911 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:43:19.804918 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:43:19.804928 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:43:19.804935 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:43:19.804943 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:43:19.804951 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:43:19.804962 systemd-journald[197]: Journal started Feb 12 19:43:19.805009 systemd-journald[197]: Runtime Journal (/run/log/journal/5b9a3ac9d8af4c79ae5a90db7054a484) is 6.0M, max 48.4M, 42.4M free. Feb 12 19:43:19.786375 systemd-modules-load[198]: Inserted module 'overlay' Feb 12 19:43:19.809355 kernel: audit: type=1130 audit(1707766999.806:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.809383 systemd[1]: Started systemd-journald.service. Feb 12 19:43:19.809394 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:43:19.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.814436 kernel: Bridge firewalling registered Feb 12 19:43:19.814464 kernel: audit: type=1130 audit(1707766999.811:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.814469 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 12 19:43:19.815856 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:43:19.820002 kernel: audit: type=1130 audit(1707766999.815:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.816959 systemd-resolved[199]: Positive Trust Anchors: Feb 12 19:43:19.824071 kernel: audit: type=1130 audit(1707766999.820:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.816969 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:43:19.816994 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:43:19.819110 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 12 19:43:19.819405 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:43:19.820386 systemd[1]: Started systemd-resolved.service. Feb 12 19:43:19.821057 systemd[1]: Reached target nss-lookup.target. Feb 12 19:43:19.832254 kernel: SCSI subsystem initialized Feb 12 19:43:19.837114 dracut-cmdline[214]: dracut-dracut-053 Feb 12 19:43:19.839078 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:43:19.844113 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:43:19.844132 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:43:19.844995 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:43:19.847829 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 12 19:43:19.848560 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:43:19.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.849730 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:43:19.852651 kernel: audit: type=1130 audit(1707766999.848:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.857286 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:43:19.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.860796 kernel: audit: type=1130 audit(1707766999.857:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.898802 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:43:19.909798 kernel: iscsi: registered transport (tcp) Feb 12 19:43:19.927896 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:43:19.927949 kernel: QLogic iSCSI HBA Driver Feb 12 19:43:19.955942 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:43:19.959479 kernel: audit: type=1130 audit(1707766999.955:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:19.957276 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:43:20.001799 kernel: raid6: avx2x4 gen() 31060 MB/s Feb 12 19:43:20.018799 kernel: raid6: avx2x4 xor() 8125 MB/s Feb 12 19:43:20.035806 kernel: raid6: avx2x2 gen() 31092 MB/s Feb 12 19:43:20.052799 kernel: raid6: avx2x2 xor() 18569 MB/s Feb 12 19:43:20.069805 kernel: raid6: avx2x1 gen() 26017 MB/s Feb 12 19:43:20.086797 kernel: raid6: avx2x1 xor() 15154 MB/s Feb 12 19:43:20.103816 kernel: raid6: sse2x4 gen() 14128 MB/s Feb 12 19:43:20.120803 kernel: raid6: sse2x4 xor() 7131 MB/s Feb 12 19:43:20.137816 kernel: raid6: sse2x2 gen() 16000 MB/s Feb 12 19:43:20.154806 kernel: raid6: sse2x2 xor() 9788 MB/s Feb 12 19:43:20.171812 kernel: raid6: sse2x1 gen() 12357 MB/s Feb 12 19:43:20.189240 kernel: raid6: sse2x1 xor() 7741 MB/s Feb 12 19:43:20.189294 kernel: raid6: using algorithm avx2x2 gen() 31092 MB/s Feb 12 19:43:20.189304 kernel: raid6: .... xor() 18569 MB/s, rmw enabled Feb 12 19:43:20.189313 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:43:20.201783 kernel: xor: automatically using best checksumming function avx Feb 12 19:43:20.298792 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:43:20.306776 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:43:20.310694 kernel: audit: type=1130 audit(1707767000.306:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:20.310717 kernel: audit: type=1334 audit(1707767000.309:10): prog-id=7 op=LOAD Feb 12 19:43:20.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:20.309000 audit: BPF prog-id=7 op=LOAD Feb 12 19:43:20.309000 audit: BPF prog-id=8 op=LOAD Feb 12 19:43:20.310987 systemd[1]: Starting systemd-udevd.service... Feb 12 19:43:20.322118 systemd-udevd[400]: Using default interface naming scheme 'v252'. Feb 12 19:43:20.325590 systemd[1]: Started systemd-udevd.service. Feb 12 19:43:20.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:20.326951 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:43:20.335269 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Feb 12 19:43:20.354276 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:43:20.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:20.355331 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:43:20.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:20.387842 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:43:20.410833 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:43:20.417197 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:43:20.417240 kernel: GPT:9289727 != 19775487 Feb 12 19:43:20.417253 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:43:20.417265 kernel: GPT:9289727 != 19775487 Feb 12 19:43:20.417277 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:43:20.417289 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:43:20.417302 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:43:20.428833 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:43:20.428874 kernel: AES CTR mode by8 optimization enabled Feb 12 19:43:20.430784 kernel: libata version 3.00 loaded. Feb 12 19:43:20.435788 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:43:20.442795 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) Feb 12 19:43:20.444784 kernel: scsi host0: ata_piix Feb 12 19:43:20.447486 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:43:20.451919 kernel: scsi host1: ata_piix Feb 12 19:43:20.452042 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 12 19:43:20.452053 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 12 19:43:20.453447 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:43:20.454831 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:43:20.459296 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:43:20.464151 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:43:20.478816 systemd[1]: Starting disk-uuid.service... Feb 12 19:43:20.613789 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 12 19:43:20.615778 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 12 19:43:20.644913 disk-uuid[514]: Primary Header is updated. Feb 12 19:43:20.644913 disk-uuid[514]: Secondary Entries is updated. Feb 12 19:43:20.644913 disk-uuid[514]: Secondary Header is updated. Feb 12 19:43:20.648685 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 12 19:43:20.648892 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:43:20.648908 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:43:20.664798 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 12 19:43:21.653795 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:43:21.654594 disk-uuid[527]: The operation has completed successfully. Feb 12 19:43:21.671164 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:43:21.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.671243 systemd[1]: Finished disk-uuid.service. Feb 12 19:43:21.679680 systemd[1]: Starting verity-setup.service... Feb 12 19:43:21.690789 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 12 19:43:21.707255 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:43:21.708781 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:43:21.710617 systemd[1]: Finished verity-setup.service. Feb 12 19:43:21.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.765562 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:43:21.766591 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:43:21.766023 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:43:21.766637 systemd[1]: Starting ignition-setup.service... Feb 12 19:43:21.769153 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:43:21.774854 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:43:21.774889 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:43:21.774902 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:43:21.783030 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:43:21.790977 systemd[1]: Finished ignition-setup.service. Feb 12 19:43:21.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.792663 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:43:21.825131 ignition[632]: Ignition 2.14.0 Feb 12 19:43:21.825894 ignition[632]: Stage: fetch-offline Feb 12 19:43:21.826425 ignition[632]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:43:21.827003 ignition[632]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:43:21.827087 ignition[632]: parsed url from cmdline: "" Feb 12 19:43:21.827090 ignition[632]: no config URL provided Feb 12 19:43:21.827094 ignition[632]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:43:21.827100 ignition[632]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:43:21.827118 ignition[632]: op(1): [started] loading QEMU firmware config module Feb 12 19:43:21.827122 ignition[632]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:43:21.830831 ignition[632]: op(1): [finished] loading QEMU firmware config module Feb 12 19:43:21.831880 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:43:21.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.832000 audit: BPF prog-id=9 op=LOAD Feb 12 19:43:21.833679 systemd[1]: Starting systemd-networkd.service... Feb 12 19:43:21.886820 ignition[632]: parsing config with SHA512: ebde1fb6b6ba62706110d7c161299f93b12404a688cba5773012cb34243ca4d6cebd722019847be0bcfc863bb4487bf24cd013029b7164162fe009ebaf0bd3a1 Feb 12 19:43:21.903886 systemd-networkd[708]: lo: Link UP Feb 12 19:43:21.903898 systemd-networkd[708]: lo: Gained carrier Feb 12 19:43:21.904327 systemd-networkd[708]: Enumeration completed Feb 12 19:43:21.904505 systemd-networkd[708]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:43:21.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.905722 systemd-networkd[708]: eth0: Link UP Feb 12 19:43:21.905726 systemd-networkd[708]: eth0: Gained carrier Feb 12 19:43:21.906032 systemd[1]: Started systemd-networkd.service. Feb 12 19:43:21.907681 systemd[1]: Reached target network.target. Feb 12 19:43:21.910579 systemd[1]: Starting iscsiuio.service... Feb 12 19:43:21.914626 systemd[1]: Started iscsiuio.service. Feb 12 19:43:21.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.915859 systemd-networkd[708]: eth0: DHCPv4 address 10.0.0.138/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:43:21.917346 systemd[1]: Starting iscsid.service... Feb 12 19:43:21.920536 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:43:21.920536 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:43:21.920536 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:43:21.920536 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:43:21.920536 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:43:21.920536 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:43:21.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.924524 ignition[632]: fetch-offline: fetch-offline passed Feb 12 19:43:21.922583 unknown[632]: fetched base config from "system" Feb 12 19:43:21.924687 ignition[632]: Ignition finished successfully Feb 12 19:43:21.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.922590 unknown[632]: fetched user config from "qemu" Feb 12 19:43:21.927335 systemd[1]: Started iscsid.service. Feb 12 19:43:21.929289 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:43:21.932794 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:43:21.933809 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:43:21.935334 systemd[1]: Starting ignition-kargs.service... Feb 12 19:43:21.941829 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:43:21.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.943345 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:43:21.944862 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:43:21.945029 ignition[716]: Ignition 2.14.0 Feb 12 19:43:21.945679 systemd[1]: Reached target remote-fs.target. Feb 12 19:43:21.945036 ignition[716]: Stage: kargs Feb 12 19:43:21.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.947065 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:43:21.945140 ignition[716]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:43:21.949034 systemd[1]: Finished ignition-kargs.service. Feb 12 19:43:21.945153 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:43:21.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.950408 systemd[1]: Starting ignition-disks.service... Feb 12 19:43:21.946661 ignition[716]: kargs: kargs passed Feb 12 19:43:21.953181 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:43:21.946721 ignition[716]: Ignition finished successfully Feb 12 19:43:21.958266 ignition[731]: Ignition 2.14.0 Feb 12 19:43:21.958274 ignition[731]: Stage: disks Feb 12 19:43:21.958376 ignition[731]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:43:21.958387 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:43:21.959931 ignition[731]: disks: disks passed Feb 12 19:43:21.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:21.960795 systemd[1]: Finished ignition-disks.service. Feb 12 19:43:21.959973 ignition[731]: Ignition finished successfully Feb 12 19:43:21.961702 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:43:21.962650 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:43:21.963253 systemd[1]: Reached target local-fs.target. Feb 12 19:43:21.963530 systemd[1]: Reached target sysinit.target. Feb 12 19:43:21.963633 systemd[1]: Reached target basic.target. Feb 12 19:43:21.964475 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:43:21.990905 systemd-fsck[744]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 19:43:22.071452 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:43:22.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:22.072963 systemd[1]: Mounting sysroot.mount... Feb 12 19:43:22.080602 systemd[1]: Mounted sysroot.mount. Feb 12 19:43:22.080951 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:43:22.081544 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:43:22.082734 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:43:22.083338 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:43:22.083370 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:43:22.083389 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:43:22.085550 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:43:22.086468 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:43:22.091879 initrd-setup-root[754]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:43:22.095476 initrd-setup-root[762]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:43:22.098093 initrd-setup-root[770]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:43:22.101265 initrd-setup-root[778]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:43:22.122019 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:43:22.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:22.123405 systemd[1]: Starting ignition-mount.service... Feb 12 19:43:22.124352 systemd[1]: Starting sysroot-boot.service... Feb 12 19:43:22.128617 bash[795]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:43:22.135454 ignition[797]: INFO : Ignition 2.14.0 Feb 12 19:43:22.135454 ignition[797]: INFO : Stage: mount Feb 12 19:43:22.136825 ignition[797]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:43:22.136825 ignition[797]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:43:22.136825 ignition[797]: INFO : mount: mount passed Feb 12 19:43:22.136825 ignition[797]: INFO : Ignition finished successfully Feb 12 19:43:22.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:22.137224 systemd[1]: Finished ignition-mount.service. Feb 12 19:43:22.146237 systemd[1]: Finished sysroot-boot.service. Feb 12 19:43:22.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:22.717670 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:43:22.723786 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (806) Feb 12 19:43:22.725955 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:43:22.725974 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:43:22.725986 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:43:22.728992 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:43:22.729842 systemd[1]: Starting ignition-files.service... Feb 12 19:43:22.741804 ignition[826]: INFO : Ignition 2.14.0 Feb 12 19:43:22.741804 ignition[826]: INFO : Stage: files Feb 12 19:43:22.742982 ignition[826]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:43:22.742982 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:43:22.745700 ignition[826]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:43:22.747003 ignition[826]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:43:22.748115 ignition[826]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:43:22.749609 ignition[826]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:43:22.750660 ignition[826]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:43:22.750660 ignition[826]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:43:22.750352 unknown[826]: wrote ssh authorized keys file for user: core Feb 12 19:43:22.754329 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:43:22.754329 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:43:23.139344 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:43:23.299960 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:43:23.302032 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:43:23.302032 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:43:23.302032 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:43:23.483970 systemd-networkd[708]: eth0: Gained IPv6LL Feb 12 19:43:23.580733 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:43:23.654390 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:43:23.662626 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:43:23.662626 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:43:23.662626 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 19:43:24.967352 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:46:59.322713 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:46:59.324290 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:46:59.324290 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:46:59.440003 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:46:59.654775 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 19:46:59.656805 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:46:59.656805 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:46:59.656805 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:46:59.702629 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:47:00.028799 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 19:47:00.030689 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:47:00.031757 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:47:00.032853 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 12 19:47:00.079094 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:47:00.251929 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 12 19:47:00.253782 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:47:00.253782 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:47:00.256036 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:47:00.257160 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:47:00.258440 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:47:00.259588 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:47:00.260722 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:47:00.261832 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:47:00.262964 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:47:00.264100 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:47:00.265238 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:47:00.266436 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:47:00.267624 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:47:00.267624 ignition[826]: INFO : files: op(f): [started] processing unit "coreos-metadata.service" Feb 12 19:47:00.269829 ignition[826]: INFO : files: op(f): op(10): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:47:00.269829 ignition[826]: INFO : files: op(f): op(10): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:47:00.269829 ignition[826]: INFO : files: op(f): [finished] processing unit "coreos-metadata.service" Feb 12 19:47:00.269829 ignition[826]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:47:00.269829 ignition[826]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:47:00.275451 ignition[826]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:47:00.275451 ignition[826]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:47:00.275451 ignition[826]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Feb 12 19:47:00.275451 ignition[826]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:47:00.279799 ignition[826]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:47:00.299537 ignition[826]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:47:00.300613 ignition[826]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:47:00.300613 ignition[826]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:47:00.302548 ignition[826]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:47:00.302548 ignition[826]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:47:00.302548 ignition[826]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:47:00.302548 ignition[826]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:47:00.302548 ignition[826]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:47:00.307216 ignition[826]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:47:00.308343 ignition[826]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:47:00.309460 ignition[826]: INFO : files: files passed Feb 12 19:47:00.310044 ignition[826]: INFO : Ignition finished successfully Feb 12 19:47:00.310980 systemd[1]: Finished ignition-files.service. Feb 12 19:47:00.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.312857 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:47:00.312879 kernel: audit: type=1130 audit(1707767220.311:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.313014 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:47:00.316008 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:47:00.317360 initrd-setup-root-after-ignition[849]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:47:00.318379 initrd-setup-root-after-ignition[851]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:47:00.319654 systemd[1]: Starting ignition-quench.service... Feb 12 19:47:00.320858 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:47:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.322336 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:47:00.329484 kernel: audit: type=1130 audit(1707767220.321:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.329516 kernel: audit: type=1130 audit(1707767220.324:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.329526 kernel: audit: type=1131 audit(1707767220.324:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.322403 systemd[1]: Finished ignition-quench.service. Feb 12 19:47:00.329485 systemd[1]: Reached target ignition-complete.target. Feb 12 19:47:00.331641 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:47:00.342376 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:47:00.343091 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:47:00.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.344216 systemd[1]: Reached target initrd-fs.target. Feb 12 19:47:00.349001 kernel: audit: type=1130 audit(1707767220.343:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.349014 kernel: audit: type=1131 audit(1707767220.343:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.348993 systemd[1]: Reached target initrd.target. Feb 12 19:47:00.349988 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:47:00.351414 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:47:00.360549 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:47:00.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.362218 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:47:00.364547 kernel: audit: type=1130 audit(1707767220.360:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.369886 systemd[1]: Stopped target network.target. Feb 12 19:47:00.371003 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:47:00.372122 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:47:00.373342 systemd[1]: Stopped target timers.target. Feb 12 19:47:00.374399 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:47:00.375099 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:47:00.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.376276 systemd[1]: Stopped target initrd.target. Feb 12 19:47:00.379090 kernel: audit: type=1131 audit(1707767220.376:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.379156 systemd[1]: Stopped target basic.target. Feb 12 19:47:00.380191 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:47:00.381389 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:47:00.382570 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:47:00.383793 systemd[1]: Stopped target remote-fs.target. Feb 12 19:47:00.384881 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:47:00.386060 systemd[1]: Stopped target sysinit.target. Feb 12 19:47:00.387122 systemd[1]: Stopped target local-fs.target. Feb 12 19:47:00.388187 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:47:00.389316 systemd[1]: Stopped target swap.target. Feb 12 19:47:00.390316 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:47:00.391013 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:47:00.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.392203 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:47:00.395085 kernel: audit: type=1131 audit(1707767220.391:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.395121 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:47:00.395813 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:47:00.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.396951 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:47:00.397044 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:47:00.400631 kernel: audit: type=1131 audit(1707767220.396:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.400731 systemd[1]: Stopped target paths.target. Feb 12 19:47:00.401783 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:47:00.402524 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:47:00.403760 systemd[1]: Stopped target slices.target. Feb 12 19:47:00.404809 systemd[1]: Stopped target sockets.target. Feb 12 19:47:00.405851 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:47:00.406445 systemd[1]: Closed iscsid.socket. Feb 12 19:47:00.407407 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:47:00.408024 systemd[1]: Closed iscsiuio.socket. Feb 12 19:47:00.409005 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:47:00.409834 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:47:00.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.411233 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:47:00.411909 systemd[1]: Stopped ignition-files.service. Feb 12 19:47:00.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.413604 systemd[1]: Stopping ignition-mount.service... Feb 12 19:47:00.415171 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:47:00.416286 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:47:00.417486 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:47:00.418500 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:47:00.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.418595 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:47:00.421863 ignition[866]: INFO : Ignition 2.14.0 Feb 12 19:47:00.421863 ignition[866]: INFO : Stage: umount Feb 12 19:47:00.421863 ignition[866]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:00.421863 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:00.421863 ignition[866]: INFO : umount: umount passed Feb 12 19:47:00.421863 ignition[866]: INFO : Ignition finished successfully Feb 12 19:47:00.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.419861 systemd-networkd[708]: eth0: DHCPv6 lease lost Feb 12 19:47:00.419965 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:47:00.420047 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:47:00.429495 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:47:00.430744 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:47:00.431428 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:47:00.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.433172 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:47:00.433864 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:47:00.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.435542 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:47:00.436203 systemd[1]: Stopped ignition-mount.service. Feb 12 19:47:00.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.437485 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:47:00.438128 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:47:00.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.439000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:47:00.439000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:47:00.439415 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:47:00.440103 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:47:00.441116 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:47:00.441149 systemd[1]: Stopped ignition-disks.service. Feb 12 19:47:00.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.442715 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:47:00.442744 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:47:00.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.444322 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:47:00.444351 systemd[1]: Stopped ignition-setup.service. Feb 12 19:47:00.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.445966 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:47:00.445996 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:47:00.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.448182 systemd[1]: Stopping network-cleanup.service... Feb 12 19:47:00.449222 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:47:00.449259 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:47:00.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.451014 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:47:00.451052 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:47:00.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.452673 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:47:00.453381 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:47:00.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.454566 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:47:00.456292 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:47:00.457511 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:47:00.458179 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:47:00.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.459928 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:47:00.460634 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:47:00.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.462104 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:47:00.462752 systemd[1]: Stopped network-cleanup.service. Feb 12 19:47:00.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.464459 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:47:00.464493 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:47:00.466166 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:47:00.466194 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:47:00.467855 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:47:00.467890 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:47:00.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.469517 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:47:00.469546 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:47:00.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.471135 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:47:00.471166 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:47:00.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.473377 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:47:00.474539 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:47:00.474576 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:47:00.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.476469 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:47:00.476505 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:47:00.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.478217 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:47:00.478247 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:47:00.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.480567 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:47:00.481827 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:47:00.482555 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:47:00.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.483862 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:47:00.485589 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:47:00.500742 systemd[1]: Switching root. Feb 12 19:47:00.521128 iscsid[714]: iscsid shutting down. Feb 12 19:47:00.521622 systemd-journald[197]: Journal stopped Feb 12 19:47:02.738807 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Feb 12 19:47:02.738868 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:47:02.738881 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:47:02.738890 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:47:02.738900 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:47:02.738909 kernel: SELinux: policy capability open_perms=1 Feb 12 19:47:02.738918 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:47:02.738928 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:47:02.738937 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:47:02.738947 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:47:02.738956 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:47:02.738973 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:47:02.738984 systemd[1]: Successfully loaded SELinux policy in 36.049ms. Feb 12 19:47:02.739006 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.401ms. Feb 12 19:47:02.739018 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:47:02.739029 systemd[1]: Detected virtualization kvm. Feb 12 19:47:02.739040 systemd[1]: Detected architecture x86-64. Feb 12 19:47:02.739051 systemd[1]: Detected first boot. Feb 12 19:47:02.739061 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:47:02.739075 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:47:02.739091 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:47:02.739102 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:02.739113 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:02.739125 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:02.739136 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:47:02.739147 systemd[1]: Stopped iscsiuio.service. Feb 12 19:47:02.739157 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:47:02.739167 systemd[1]: Stopped iscsid.service. Feb 12 19:47:02.739178 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:47:02.739187 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:47:02.739197 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:47:02.739208 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:47:02.739218 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:47:02.739228 systemd[1]: Created slice system-getty.slice. Feb 12 19:47:02.739239 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:47:02.739250 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:47:02.739259 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:47:02.739269 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:47:02.739279 systemd[1]: Created slice user.slice. Feb 12 19:47:02.739289 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:47:02.739299 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:47:02.739310 systemd[1]: Set up automount boot.automount. Feb 12 19:47:02.739320 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:47:02.739330 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:47:02.739340 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:47:02.739351 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:47:02.739360 systemd[1]: Reached target integritysetup.target. Feb 12 19:47:02.739371 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:47:02.739381 systemd[1]: Reached target remote-fs.target. Feb 12 19:47:02.739391 systemd[1]: Reached target slices.target. Feb 12 19:47:02.739401 systemd[1]: Reached target swap.target. Feb 12 19:47:02.739412 systemd[1]: Reached target torcx.target. Feb 12 19:47:02.739422 systemd[1]: Reached target veritysetup.target. Feb 12 19:47:02.739432 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:47:02.739443 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:47:02.739452 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:47:02.739463 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:47:02.739473 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:47:02.739483 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:47:02.739493 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:47:02.739504 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:47:02.739513 systemd[1]: Mounting media.mount... Feb 12 19:47:02.739524 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:47:02.739534 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:47:02.739547 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:47:02.739557 systemd[1]: Mounting tmp.mount... Feb 12 19:47:02.739567 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:47:02.739577 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:47:02.739587 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:47:02.739599 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:47:02.739609 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:47:02.739618 systemd[1]: Starting modprobe@drm.service... Feb 12 19:47:02.739628 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:47:02.739638 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:47:02.739648 systemd[1]: Starting modprobe@loop.service... Feb 12 19:47:02.739659 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:47:02.739670 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:47:02.739680 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:47:02.739691 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:47:02.739702 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:47:02.739711 systemd[1]: Stopped systemd-journald.service. Feb 12 19:47:02.739720 kernel: loop: module loaded Feb 12 19:47:02.739730 kernel: fuse: init (API version 7.34) Feb 12 19:47:02.739744 systemd[1]: Starting systemd-journald.service... Feb 12 19:47:02.739756 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:47:02.739779 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:47:02.739802 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:47:02.739813 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:47:02.739824 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:47:02.739834 systemd[1]: Stopped verity-setup.service. Feb 12 19:47:02.739845 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:47:02.739855 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:47:02.739867 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:47:02.739877 systemd[1]: Mounted media.mount. Feb 12 19:47:02.739888 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:47:02.739901 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:47:02.739913 systemd-journald[974]: Journal started Feb 12 19:47:02.739953 systemd-journald[974]: Runtime Journal (/run/log/journal/5b9a3ac9d8af4c79ae5a90db7054a484) is 6.0M, max 48.4M, 42.4M free. Feb 12 19:47:00.576000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:47:00.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:47:00.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:47:00.604000 audit: BPF prog-id=10 op=LOAD Feb 12 19:47:00.604000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:47:00.604000 audit: BPF prog-id=11 op=LOAD Feb 12 19:47:00.604000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:47:00.631000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:47:00.631000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:00.631000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:47:00.632000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:47:00.632000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9b5 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:00.632000 audit: CWD cwd="/" Feb 12 19:47:00.632000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.632000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.632000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:47:02.638000 audit: BPF prog-id=12 op=LOAD Feb 12 19:47:02.638000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:47:02.638000 audit: BPF prog-id=13 op=LOAD Feb 12 19:47:02.638000 audit: BPF prog-id=14 op=LOAD Feb 12 19:47:02.638000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:47:02.638000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:47:02.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.650000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:47:02.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.719000 audit: BPF prog-id=15 op=LOAD Feb 12 19:47:02.719000 audit: BPF prog-id=16 op=LOAD Feb 12 19:47:02.719000 audit: BPF prog-id=17 op=LOAD Feb 12 19:47:02.719000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:47:02.719000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:47:02.740806 systemd[1]: Mounted tmp.mount. Feb 12 19:47:02.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.737000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:47:02.737000 audit[974]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd581831f0 a2=4000 a3=7ffd5818328c items=0 ppid=1 pid=974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:02.737000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:47:02.637274 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:47:00.630849 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:02.637286 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:47:00.631115 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:47:02.640322 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:47:00.631135 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:47:00.631164 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:47:00.631175 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:47:00.631217 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:47:00.631232 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:47:00.631400 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:47:00.631435 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:47:02.741778 systemd[1]: Started systemd-journald.service. Feb 12 19:47:00.631446 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:47:00.631746 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:47:00.631790 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:47:00.631808 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:47:02.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.631823 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:47:00.631838 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:47:00.631852 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:47:02.392318 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:02.392563 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:02.392655 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:02.392830 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:02.742481 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:47:02.392876 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:47:02.392930 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-12T19:47:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:47:02.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.743299 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:47:02.744488 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:47:02.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.745418 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:47:02.745574 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:47:02.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.746326 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:47:02.746477 systemd[1]: Finished modprobe@drm.service. Feb 12 19:47:02.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.747213 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:47:02.747381 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:47:02.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.748319 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:47:02.748480 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:47:02.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.749320 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:47:02.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.750061 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:47:02.750232 systemd[1]: Finished modprobe@loop.service. Feb 12 19:47:02.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.751063 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:47:02.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.751887 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:47:02.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.752868 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:47:02.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.753826 systemd[1]: Reached target network-pre.target. Feb 12 19:47:02.755385 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:47:02.756842 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:47:02.757380 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:47:02.759627 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:47:02.761238 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:47:02.761878 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:47:02.762825 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:47:02.763396 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:47:02.764251 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:47:02.765667 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:47:02.766917 systemd-journald[974]: Time spent on flushing to /var/log/journal/5b9a3ac9d8af4c79ae5a90db7054a484 is 47.473ms for 1183 entries. Feb 12 19:47:02.766917 systemd-journald[974]: System Journal (/var/log/journal/5b9a3ac9d8af4c79ae5a90db7054a484) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:47:02.827603 systemd-journald[974]: Received client request to flush runtime journal. Feb 12 19:47:02.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.769575 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:47:02.770255 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:47:02.828257 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:47:02.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.772547 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:47:02.773398 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:47:02.776057 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:47:02.786363 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:47:02.787893 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:47:02.803383 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:47:02.804447 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:47:02.805841 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:47:02.828252 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:47:03.193562 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:47:03.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.193000 audit: BPF prog-id=18 op=LOAD Feb 12 19:47:03.193000 audit: BPF prog-id=19 op=LOAD Feb 12 19:47:03.194000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:47:03.194000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:47:03.195352 systemd[1]: Starting systemd-udevd.service... Feb 12 19:47:03.210479 systemd-udevd[1009]: Using default interface naming scheme 'v252'. Feb 12 19:47:03.221505 systemd[1]: Started systemd-udevd.service. Feb 12 19:47:03.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.222000 audit: BPF prog-id=20 op=LOAD Feb 12 19:47:03.223796 systemd[1]: Starting systemd-networkd.service... Feb 12 19:47:03.230000 audit: BPF prog-id=21 op=LOAD Feb 12 19:47:03.230000 audit: BPF prog-id=22 op=LOAD Feb 12 19:47:03.230000 audit: BPF prog-id=23 op=LOAD Feb 12 19:47:03.231916 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:47:03.239334 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:47:03.258389 systemd[1]: Started systemd-userdbd.service. Feb 12 19:47:03.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.281791 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 19:47:03.292000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:47:03.292000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556587b7d930 a1=32194 a2=7ff7f324dbc5 a3=5 items=108 ppid=1009 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:03.292000 audit: CWD cwd="/" Feb 12 19:47:03.292000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=1 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=2 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=3 name=(null) inode=15599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=4 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=5 name=(null) inode=15600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=6 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=7 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=8 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=9 name=(null) inode=15602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=10 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=11 name=(null) inode=15603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=12 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=13 name=(null) inode=15604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=14 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=15 name=(null) inode=15605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=16 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=17 name=(null) inode=15606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=18 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=19 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=20 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=21 name=(null) inode=15608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=22 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=23 name=(null) inode=15609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=24 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=25 name=(null) inode=15610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=26 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=27 name=(null) inode=15611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=28 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=29 name=(null) inode=15612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=30 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=31 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=32 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=33 name=(null) inode=15614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=34 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=35 name=(null) inode=15615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=36 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=37 name=(null) inode=15616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=38 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=39 name=(null) inode=15617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=40 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=41 name=(null) inode=15618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=42 name=(null) inode=15598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=43 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=44 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=45 name=(null) inode=15620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=46 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=47 name=(null) inode=15621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=48 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=49 name=(null) inode=15622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=50 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=51 name=(null) inode=15623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=52 name=(null) inode=15619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=53 name=(null) inode=15624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=55 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=56 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=57 name=(null) inode=15626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=58 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=59 name=(null) inode=15627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=60 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=61 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=62 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=63 name=(null) inode=15629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=64 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=65 name=(null) inode=15630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=66 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=67 name=(null) inode=15631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=68 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=69 name=(null) inode=15632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=70 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=71 name=(null) inode=15633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=72 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=73 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=74 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=75 name=(null) inode=15635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=76 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=77 name=(null) inode=15636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=78 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=79 name=(null) inode=15637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=80 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=81 name=(null) inode=15638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.303835 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 12 19:47:03.292000 audit: PATH item=82 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=83 name=(null) inode=15639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=84 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=85 name=(null) inode=15640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=86 name=(null) inode=15640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=87 name=(null) inode=15641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=88 name=(null) inode=15640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=89 name=(null) inode=15642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=90 name=(null) inode=15640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=91 name=(null) inode=15643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=92 name=(null) inode=15640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=93 name=(null) inode=15644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=94 name=(null) inode=15640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.305877 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:47:03.292000 audit: PATH item=95 name=(null) inode=15645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=96 name=(null) inode=15625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=97 name=(null) inode=15646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=98 name=(null) inode=15646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=99 name=(null) inode=15647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=100 name=(null) inode=15646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=101 name=(null) inode=15648 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=102 name=(null) inode=15646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=103 name=(null) inode=15649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=104 name=(null) inode=15646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=105 name=(null) inode=15650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=106 name=(null) inode=15646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PATH item=107 name=(null) inode=15651 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:03.292000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:47:03.301024 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:47:03.308557 systemd-networkd[1018]: lo: Link UP Feb 12 19:47:03.308560 systemd-networkd[1018]: lo: Gained carrier Feb 12 19:47:03.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.308898 systemd-networkd[1018]: Enumeration completed Feb 12 19:47:03.308963 systemd[1]: Started systemd-networkd.service. Feb 12 19:47:03.309346 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:47:03.310560 systemd-networkd[1018]: eth0: Link UP Feb 12 19:47:03.310566 systemd-networkd[1018]: eth0: Gained carrier Feb 12 19:47:03.319803 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 19:47:03.323872 systemd-networkd[1018]: eth0: DHCPv4 address 10.0.0.138/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:47:03.326789 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:47:03.374108 kernel: kvm: Nested Virtualization enabled Feb 12 19:47:03.374203 kernel: SVM: kvm: Nested Paging enabled Feb 12 19:47:03.374222 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 12 19:47:03.374919 kernel: SVM: Virtual GIF supported Feb 12 19:47:03.387793 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:47:03.400080 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:47:03.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.401838 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:47:03.408184 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:47:03.433353 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:47:03.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.434060 systemd[1]: Reached target cryptsetup.target. Feb 12 19:47:03.436109 systemd[1]: Starting lvm2-activation.service... Feb 12 19:47:03.438835 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:47:03.465290 systemd[1]: Finished lvm2-activation.service. Feb 12 19:47:03.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.465958 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:47:03.466540 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:47:03.466562 systemd[1]: Reached target local-fs.target. Feb 12 19:47:03.467124 systemd[1]: Reached target machines.target. Feb 12 19:47:03.468499 systemd[1]: Starting ldconfig.service... Feb 12 19:47:03.469196 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:47:03.469236 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:03.470043 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:47:03.471467 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:47:03.473002 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:47:03.474099 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:47:03.474139 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:47:03.474938 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:47:03.476470 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Feb 12 19:47:03.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.477459 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:47:03.478980 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:47:03.489415 systemd-tmpfiles[1051]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:47:03.489884 systemd-tmpfiles[1051]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:47:03.490971 systemd-tmpfiles[1051]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:47:03.509675 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Feb 12 19:47:03.509675 systemd-fsck[1056]: /dev/vda1: 790 files, 115362/258078 clusters Feb 12 19:47:03.511137 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:47:03.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.513428 systemd[1]: Mounting boot.mount... Feb 12 19:47:03.542542 systemd[1]: Mounted boot.mount. Feb 12 19:47:03.554841 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:47:03.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.563624 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:47:04.727197 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:47:04.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.729088 systemd[1]: Starting audit-rules.service... Feb 12 19:47:04.730661 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:47:04.732042 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:47:04.733000 audit: BPF prog-id=24 op=LOAD Feb 12 19:47:04.734578 systemd[1]: Starting systemd-resolved.service... Feb 12 19:47:04.735000 audit: BPF prog-id=25 op=LOAD Feb 12 19:47:04.736524 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:47:04.738351 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:47:04.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.739564 systemd[1]: Finished ldconfig.service. Feb 12 19:47:04.740454 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:47:04.741400 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:47:04.741000 audit[1071]: SYSTEM_BOOT pid=1071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.747812 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:47:04.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.754219 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:47:04.754653 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:47:04.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.759456 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:47:04.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.761159 systemd[1]: Starting systemd-update-done.service... Feb 12 19:47:04.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:04.765978 systemd[1]: Finished systemd-update-done.service. Feb 12 19:47:04.769000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:47:04.769000 audit[1081]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc18a9b730 a2=420 a3=0 items=0 ppid=1060 pid=1081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:04.769000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:47:04.770483 augenrules[1081]: No rules Feb 12 19:47:04.770910 systemd[1]: Finished audit-rules.service. Feb 12 19:47:04.781571 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:47:04.782326 systemd[1]: Reached target time-set.target. Feb 12 19:47:04.782344 systemd-timesyncd[1070]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:47:04.782377 systemd-timesyncd[1070]: Initial clock synchronization to Mon 2024-02-12 19:47:05.084556 UTC. Feb 12 19:47:04.782826 systemd-resolved[1069]: Positive Trust Anchors: Feb 12 19:47:04.782839 systemd-resolved[1069]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:47:04.782866 systemd-resolved[1069]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:47:04.788833 systemd-resolved[1069]: Defaulting to hostname 'linux'. Feb 12 19:47:04.790079 systemd[1]: Started systemd-resolved.service. Feb 12 19:47:04.790670 systemd[1]: Reached target network.target. Feb 12 19:47:04.791215 systemd[1]: Reached target nss-lookup.target. Feb 12 19:47:04.791777 systemd[1]: Reached target sysinit.target. Feb 12 19:47:04.792378 systemd[1]: Started motdgen.path. Feb 12 19:47:04.792884 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:47:04.793712 systemd[1]: Started logrotate.timer. Feb 12 19:47:04.794303 systemd[1]: Started mdadm.timer. Feb 12 19:47:04.794788 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:47:04.795369 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:47:04.795394 systemd[1]: Reached target paths.target. Feb 12 19:47:04.795924 systemd[1]: Reached target timers.target. Feb 12 19:47:04.796648 systemd[1]: Listening on dbus.socket. Feb 12 19:47:04.796816 systemd-networkd[1018]: eth0: Gained IPv6LL Feb 12 19:47:04.798025 systemd[1]: Starting docker.socket... Feb 12 19:47:04.800315 systemd[1]: Listening on sshd.socket. Feb 12 19:47:04.800984 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:04.801296 systemd[1]: Listening on docker.socket. Feb 12 19:47:04.801880 systemd[1]: Reached target sockets.target. Feb 12 19:47:04.802419 systemd[1]: Reached target basic.target. Feb 12 19:47:04.802988 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:47:04.803009 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:47:04.803744 systemd[1]: Starting containerd.service... Feb 12 19:47:04.805059 systemd[1]: Starting dbus.service... Feb 12 19:47:04.806280 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:47:04.807673 systemd[1]: Starting extend-filesystems.service... Feb 12 19:47:04.808682 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:47:04.809609 systemd[1]: Starting motdgen.service... Feb 12 19:47:04.810501 jq[1091]: false Feb 12 19:47:04.811527 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:47:04.813163 systemd[1]: Starting prepare-critools.service... Feb 12 19:47:04.815491 systemd[1]: Starting prepare-helm.service... Feb 12 19:47:04.816856 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:47:04.817500 extend-filesystems[1092]: Found sr0 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda1 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda2 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda3 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found usr Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda4 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda6 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda7 Feb 12 19:47:04.818265 extend-filesystems[1092]: Found vda9 Feb 12 19:47:04.818265 extend-filesystems[1092]: Checking size of /dev/vda9 Feb 12 19:47:04.821514 systemd[1]: Starting sshd-keygen.service... Feb 12 19:47:04.827138 systemd[1]: Starting systemd-logind.service... Feb 12 19:47:04.827759 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:04.827819 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:47:04.829519 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:47:04.834302 jq[1114]: true Feb 12 19:47:04.830082 systemd[1]: Starting update-engine.service... Feb 12 19:47:04.831518 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:47:04.838251 dbus-daemon[1090]: [system] SELinux support is enabled Feb 12 19:47:04.833365 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:47:04.833491 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:47:04.837743 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:47:04.837902 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:47:04.838664 systemd[1]: Started dbus.service. Feb 12 19:47:04.840949 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:47:04.841075 systemd[1]: Finished motdgen.service. Feb 12 19:47:04.845898 jq[1122]: true Feb 12 19:47:04.846043 tar[1116]: ./ Feb 12 19:47:04.846043 tar[1116]: ./loopback Feb 12 19:47:04.846506 tar[1119]: linux-amd64/helm Feb 12 19:47:04.850149 extend-filesystems[1092]: Resized partition /dev/vda9 Feb 12 19:47:04.847485 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:47:04.847501 systemd[1]: Reached target system-config.target. Feb 12 19:47:04.851220 tar[1118]: crictl Feb 12 19:47:04.848507 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:47:04.848520 systemd[1]: Reached target user-config.target. Feb 12 19:47:04.853084 extend-filesystems[1133]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:47:04.857800 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:47:04.869647 update_engine[1113]: I0212 19:47:04.869246 1113 main.cc:92] Flatcar Update Engine starting Feb 12 19:47:04.870986 systemd[1]: Started update-engine.service. Feb 12 19:47:04.872345 update_engine[1113]: I0212 19:47:04.871057 1113 update_check_scheduler.cc:74] Next update check in 10m49s Feb 12 19:47:04.872801 systemd[1]: Started locksmithd.service. Feb 12 19:47:04.873555 env[1123]: time="2024-02-12T19:47:04.873511314Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:47:04.875726 systemd-logind[1110]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:47:04.875750 systemd-logind[1110]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:47:04.876014 systemd-logind[1110]: New seat seat0. Feb 12 19:47:04.878596 systemd[1]: Started systemd-logind.service. Feb 12 19:47:04.887786 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:47:04.902261 env[1123]: time="2024-02-12T19:47:04.902128511Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:47:04.904473 env[1123]: time="2024-02-12T19:47:04.903002640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:04.903926 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:47:04.904571 extend-filesystems[1133]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:47:04.904571 extend-filesystems[1133]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:47:04.904571 extend-filesystems[1133]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:47:04.904066 systemd[1]: Finished extend-filesystems.service. Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905160837Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905184952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905343900Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905358578Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905370510Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905379256Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.905439329Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.907133656Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.907243662Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:04.908397 env[1123]: time="2024-02-12T19:47:04.907258420Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:47:04.908657 extend-filesystems[1092]: Resized filesystem in /dev/vda9 Feb 12 19:47:04.909390 env[1123]: time="2024-02-12T19:47:04.907299898Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:47:04.909390 env[1123]: time="2024-02-12T19:47:04.907310658Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:47:04.915478 env[1123]: time="2024-02-12T19:47:04.915448827Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:47:04.915573 env[1123]: time="2024-02-12T19:47:04.915549045Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:47:04.915658 env[1123]: time="2024-02-12T19:47:04.915638703Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:47:04.915760 env[1123]: time="2024-02-12T19:47:04.915742988Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.915860 env[1123]: time="2024-02-12T19:47:04.915840331Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.915947 env[1123]: time="2024-02-12T19:47:04.915928596Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.916030 env[1123]: time="2024-02-12T19:47:04.916012123Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.916107 env[1123]: time="2024-02-12T19:47:04.916088616Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.916184 env[1123]: time="2024-02-12T19:47:04.916166032Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.916298 env[1123]: time="2024-02-12T19:47:04.916262312Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.916373 env[1123]: time="2024-02-12T19:47:04.916355807Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.916449 env[1123]: time="2024-02-12T19:47:04.916430848Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:47:04.917393 bash[1151]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:47:04.917167 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.916617648Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.916685185Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.916915016Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.916938119Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.916950202Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917000626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917012549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917024341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917034360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917046593Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917058425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917069005Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917078983Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917091276Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:47:04.917699 env[1123]: time="2024-02-12T19:47:04.917184381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917198187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917212113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917222853Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917896045Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917917235Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917936691Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:47:04.918852 env[1123]: time="2024-02-12T19:47:04.917969072Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:47:04.919017 systemd[1]: Started containerd.service. Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918142207Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918194545Z" level=info msg="Connect containerd service" Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918226034Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918683762Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918891572Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918934512Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:47:04.919403 env[1123]: time="2024-02-12T19:47:04.918973506Z" level=info msg="containerd successfully booted in 0.046018s" Feb 12 19:47:04.932431 env[1123]: time="2024-02-12T19:47:04.932386795Z" level=info msg="Start subscribing containerd event" Feb 12 19:47:04.932431 env[1123]: time="2024-02-12T19:47:04.932426570Z" level=info msg="Start recovering state" Feb 12 19:47:04.932501 env[1123]: time="2024-02-12T19:47:04.932471635Z" level=info msg="Start event monitor" Feb 12 19:47:04.932501 env[1123]: time="2024-02-12T19:47:04.932483968Z" level=info msg="Start snapshots syncer" Feb 12 19:47:04.932501 env[1123]: time="2024-02-12T19:47:04.932491892Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:47:04.932501 env[1123]: time="2024-02-12T19:47:04.932498455Z" level=info msg="Start streaming server" Feb 12 19:47:04.934706 tar[1116]: ./bandwidth Feb 12 19:47:04.972097 tar[1116]: ./ptp Feb 12 19:47:05.006254 tar[1116]: ./vlan Feb 12 19:47:05.040217 tar[1116]: ./host-device Feb 12 19:47:05.073521 tar[1116]: ./tuning Feb 12 19:47:05.103454 tar[1116]: ./vrf Feb 12 19:47:05.134887 tar[1116]: ./sbr Feb 12 19:47:05.142766 sshd_keygen[1117]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:47:05.159576 locksmithd[1139]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:47:05.165268 systemd[1]: Finished sshd-keygen.service. Feb 12 19:47:05.167186 systemd[1]: Starting issuegen.service... Feb 12 19:47:05.172223 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:47:05.172335 systemd[1]: Finished issuegen.service. Feb 12 19:47:05.173933 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:47:05.177868 tar[1116]: ./tap Feb 12 19:47:05.178890 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:47:05.180581 systemd[1]: Started getty@tty1.service. Feb 12 19:47:05.182044 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:47:05.182855 systemd[1]: Reached target getty.target. Feb 12 19:47:05.216530 tar[1116]: ./dhcp Feb 12 19:47:05.263245 tar[1119]: linux-amd64/LICENSE Feb 12 19:47:05.263290 tar[1119]: linux-amd64/README.md Feb 12 19:47:05.267117 systemd[1]: Finished prepare-helm.service. Feb 12 19:47:05.299335 tar[1116]: ./static Feb 12 19:47:05.307306 systemd[1]: Finished prepare-critools.service. Feb 12 19:47:05.321512 tar[1116]: ./firewall Feb 12 19:47:05.355459 tar[1116]: ./macvlan Feb 12 19:47:05.385987 tar[1116]: ./dummy Feb 12 19:47:05.416201 tar[1116]: ./bridge Feb 12 19:47:05.449255 tar[1116]: ./ipvlan Feb 12 19:47:05.479649 tar[1116]: ./portmap Feb 12 19:47:05.508595 tar[1116]: ./host-local Feb 12 19:47:05.542570 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:47:05.543492 systemd[1]: Reached target multi-user.target. Feb 12 19:47:05.545051 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:47:05.551762 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:47:05.551893 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:47:05.552688 systemd[1]: Startup finished in 524ms (kernel) + 3min 40.881s (initrd) + 5.013s (userspace) = 3min 46.419s. Feb 12 19:47:14.857808 systemd[1]: Created slice system-sshd.slice. Feb 12 19:47:14.858687 systemd[1]: Started sshd@0-10.0.0.138:22-10.0.0.1:54134.service. Feb 12 19:47:14.892720 sshd[1178]: Accepted publickey for core from 10.0.0.1 port 54134 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:14.893925 sshd[1178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:14.901615 systemd-logind[1110]: New session 1 of user core. Feb 12 19:47:14.902373 systemd[1]: Created slice user-500.slice. Feb 12 19:47:14.903283 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:47:14.910274 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:47:14.911511 systemd[1]: Starting user@500.service... Feb 12 19:47:14.913587 (systemd)[1181]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:14.977484 systemd[1181]: Queued start job for default target default.target. Feb 12 19:47:14.977881 systemd[1181]: Reached target paths.target. Feb 12 19:47:14.977900 systemd[1181]: Reached target sockets.target. Feb 12 19:47:14.977912 systemd[1181]: Reached target timers.target. Feb 12 19:47:14.977921 systemd[1181]: Reached target basic.target. Feb 12 19:47:14.977953 systemd[1181]: Reached target default.target. Feb 12 19:47:14.977975 systemd[1181]: Startup finished in 60ms. Feb 12 19:47:14.978005 systemd[1]: Started user@500.service. Feb 12 19:47:14.978726 systemd[1]: Started session-1.scope. Feb 12 19:47:15.028264 systemd[1]: Started sshd@1-10.0.0.138:22-10.0.0.1:54140.service. Feb 12 19:47:15.060316 sshd[1190]: Accepted publickey for core from 10.0.0.1 port 54140 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:15.061339 sshd[1190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:15.064537 systemd-logind[1110]: New session 2 of user core. Feb 12 19:47:15.065222 systemd[1]: Started session-2.scope. Feb 12 19:47:15.761745 sshd[1190]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:15.764318 systemd[1]: sshd@1-10.0.0.138:22-10.0.0.1:54140.service: Deactivated successfully. Feb 12 19:47:15.764979 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:47:15.765505 systemd-logind[1110]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:47:15.766844 systemd[1]: Started sshd@2-10.0.0.138:22-10.0.0.1:54148.service. Feb 12 19:47:15.767464 systemd-logind[1110]: Removed session 2. Feb 12 19:47:15.797737 sshd[1196]: Accepted publickey for core from 10.0.0.1 port 54148 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:15.798669 sshd[1196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:15.801464 systemd-logind[1110]: New session 3 of user core. Feb 12 19:47:15.802181 systemd[1]: Started session-3.scope. Feb 12 19:47:15.850444 sshd[1196]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:15.852765 systemd[1]: sshd@2-10.0.0.138:22-10.0.0.1:54148.service: Deactivated successfully. Feb 12 19:47:15.853332 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:47:15.853854 systemd-logind[1110]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:47:15.854691 systemd[1]: Started sshd@3-10.0.0.138:22-10.0.0.1:54154.service. Feb 12 19:47:15.855389 systemd-logind[1110]: Removed session 3. Feb 12 19:47:15.885279 sshd[1202]: Accepted publickey for core from 10.0.0.1 port 54154 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:15.886394 sshd[1202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:15.889260 systemd-logind[1110]: New session 4 of user core. Feb 12 19:47:15.890154 systemd[1]: Started session-4.scope. Feb 12 19:47:15.942734 sshd[1202]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:15.945036 systemd[1]: sshd@3-10.0.0.138:22-10.0.0.1:54154.service: Deactivated successfully. Feb 12 19:47:15.945565 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:47:15.946050 systemd-logind[1110]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:47:15.946934 systemd[1]: Started sshd@4-10.0.0.138:22-10.0.0.1:54170.service. Feb 12 19:47:15.947592 systemd-logind[1110]: Removed session 4. Feb 12 19:47:15.977304 sshd[1208]: Accepted publickey for core from 10.0.0.1 port 54170 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:15.978267 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:15.981122 systemd-logind[1110]: New session 5 of user core. Feb 12 19:47:15.981877 systemd[1]: Started session-5.scope. Feb 12 19:47:16.035226 sudo[1211]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:47:16.035389 sudo[1211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:47:16.043958 dbus-daemon[1090]: \xd0\xfd\x92\xfcpU: received setenforce notice (enforcing=243689872) Feb 12 19:47:16.046030 sudo[1211]: pam_unix(sudo:session): session closed for user root Feb 12 19:47:16.047483 sshd[1208]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:16.050071 systemd[1]: sshd@4-10.0.0.138:22-10.0.0.1:54170.service: Deactivated successfully. Feb 12 19:47:16.050798 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:47:16.051325 systemd-logind[1110]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:47:16.052386 systemd[1]: Started sshd@5-10.0.0.138:22-10.0.0.1:45338.service. Feb 12 19:47:16.052963 systemd-logind[1110]: Removed session 5. Feb 12 19:47:16.083275 sshd[1215]: Accepted publickey for core from 10.0.0.1 port 45338 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:16.084227 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:16.086846 systemd-logind[1110]: New session 6 of user core. Feb 12 19:47:16.087496 systemd[1]: Started session-6.scope. Feb 12 19:47:16.138098 sudo[1219]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:47:16.138258 sudo[1219]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:47:16.140482 sudo[1219]: pam_unix(sudo:session): session closed for user root Feb 12 19:47:16.144216 sudo[1218]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:47:16.144373 sudo[1218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:47:16.152144 systemd[1]: Stopping audit-rules.service... Feb 12 19:47:16.152000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:47:16.153329 auditctl[1222]: No rules Feb 12 19:47:16.153626 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:47:16.153798 systemd[1]: Stopped audit-rules.service. Feb 12 19:47:16.153849 kernel: kauditd_printk_skb: 238 callbacks suppressed Feb 12 19:47:16.153874 kernel: audit: type=1305 audit(1707767236.152:159): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:47:16.152000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6bacea90 a2=420 a3=0 items=0 ppid=1 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.155257 systemd[1]: Starting audit-rules.service... Feb 12 19:47:16.158069 kernel: audit: type=1300 audit(1707767236.152:159): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6bacea90 a2=420 a3=0 items=0 ppid=1 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.158109 kernel: audit: type=1327 audit(1707767236.152:159): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:47:16.152000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:47:16.158950 kernel: audit: type=1131 audit(1707767236.153:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.168934 augenrules[1239]: No rules Feb 12 19:47:16.169481 systemd[1]: Finished audit-rules.service. Feb 12 19:47:16.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.170078 sudo[1218]: pam_unix(sudo:session): session closed for user root Feb 12 19:47:16.171088 sshd[1215]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:16.169000 audit[1218]: USER_END pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.173951 systemd[1]: Started sshd@6-10.0.0.138:22-10.0.0.1:45344.service. Feb 12 19:47:16.174315 kernel: audit: type=1130 audit(1707767236.168:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.174355 kernel: audit: type=1106 audit(1707767236.169:162): pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.174384 kernel: audit: type=1104 audit(1707767236.169:163): pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.169000 audit[1218]: CRED_DISP pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.174367 systemd[1]: sshd@5-10.0.0.138:22-10.0.0.1:45338.service: Deactivated successfully. Feb 12 19:47:16.174891 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:47:16.175413 systemd-logind[1110]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:47:16.176217 systemd-logind[1110]: Removed session 6. Feb 12 19:47:16.171000 audit[1215]: USER_END pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.179372 kernel: audit: type=1106 audit(1707767236.171:164): pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.179416 kernel: audit: type=1104 audit(1707767236.171:165): pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.171000 audit[1215]: CRED_DISP pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.181662 kernel: audit: type=1130 audit(1707767236.173:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.138:22-10.0.0.1:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.138:22-10.0.0.1:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.138:22-10.0.0.1:45338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.206000 audit[1244]: USER_ACCT pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.207540 sshd[1244]: Accepted publickey for core from 10.0.0.1 port 45344 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:47:16.207000 audit[1244]: CRED_ACQ pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.207000 audit[1244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b7d1140 a2=3 a3=0 items=0 ppid=1 pid=1244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:47:16.208486 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:16.211110 systemd-logind[1110]: New session 7 of user core. Feb 12 19:47:16.211726 systemd[1]: Started session-7.scope. Feb 12 19:47:16.213000 audit[1244]: USER_START pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.215000 audit[1247]: CRED_ACQ pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:16.261000 audit[1248]: USER_ACCT pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.262505 sudo[1248]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:47:16.261000 audit[1248]: CRED_REFR pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.262672 sudo[1248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:47:16.263000 audit[1248]: USER_START pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.776480 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:47:16.781335 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:47:16.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:16.781639 systemd[1]: Reached target network-online.target. Feb 12 19:47:16.782892 systemd[1]: Starting docker.service... Feb 12 19:47:16.813990 env[1266]: time="2024-02-12T19:47:16.813935497Z" level=info msg="Starting up" Feb 12 19:47:16.815234 env[1266]: time="2024-02-12T19:47:16.815200253Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:47:16.815234 env[1266]: time="2024-02-12T19:47:16.815224346Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:47:16.815296 env[1266]: time="2024-02-12T19:47:16.815244082Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:47:16.815296 env[1266]: time="2024-02-12T19:47:16.815254249Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:47:16.816603 env[1266]: time="2024-02-12T19:47:16.816577498Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:47:16.816671 env[1266]: time="2024-02-12T19:47:16.816653748Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:47:16.816749 env[1266]: time="2024-02-12T19:47:16.816729704Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:47:16.816840 env[1266]: time="2024-02-12T19:47:16.816820920Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:47:16.845468 env[1266]: time="2024-02-12T19:47:16.845452310Z" level=info msg="Loading containers: start." Feb 12 19:47:16.879000 audit[1301]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.879000 audit[1301]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc53070590 a2=0 a3=7ffc5307057c items=0 ppid=1266 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:47:16.881000 audit[1303]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.881000 audit[1303]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe08003be0 a2=0 a3=7ffe08003bcc items=0 ppid=1266 pid=1303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.881000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:47:16.882000 audit[1305]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.882000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd9967f320 a2=0 a3=7ffd9967f30c items=0 ppid=1266 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.882000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:47:16.884000 audit[1307]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.884000 audit[1307]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff55c5b770 a2=0 a3=7fff55c5b75c items=0 ppid=1266 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:47:16.885000 audit[1309]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.885000 audit[1309]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea5cff3e0 a2=0 a3=7ffea5cff3cc items=0 ppid=1266 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:47:16.901000 audit[1314]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.901000 audit[1314]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb64d69e0 a2=0 a3=7ffcb64d69cc items=0 ppid=1266 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.901000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:47:16.908000 audit[1316]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.908000 audit[1316]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdc5318710 a2=0 a3=7ffdc53186fc items=0 ppid=1266 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:47:16.909000 audit[1318]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.909000 audit[1318]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffce74b2e40 a2=0 a3=7ffce74b2e2c items=0 ppid=1266 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:47:16.910000 audit[1320]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.910000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd43c936b0 a2=0 a3=7ffd43c9369c items=0 ppid=1266 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.910000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:47:16.917000 audit[1324]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.917000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffea4d6d4e0 a2=0 a3=7ffea4d6d4cc items=0 ppid=1266 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:47:16.917000 audit[1325]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.917000 audit[1325]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb02a55d0 a2=0 a3=7ffcb02a55bc items=0 ppid=1266 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:47:16.923794 kernel: Initializing XFRM netlink socket Feb 12 19:47:16.948528 env[1266]: time="2024-02-12T19:47:16.948494409Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:47:16.961000 audit[1333]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.961000 audit[1333]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcb61ce3d0 a2=0 a3=7ffcb61ce3bc items=0 ppid=1266 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:47:16.970000 audit[1336]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.970000 audit[1336]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffffcb204a0 a2=0 a3=7ffffcb2048c items=0 ppid=1266 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:47:16.972000 audit[1339]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.972000 audit[1339]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff2b09ba40 a2=0 a3=7fff2b09ba2c items=0 ppid=1266 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:47:16.973000 audit[1341]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.973000 audit[1341]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffce59ebf30 a2=0 a3=7ffce59ebf1c items=0 ppid=1266 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:47:16.975000 audit[1343]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.975000 audit[1343]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffeadb97e00 a2=0 a3=7ffeadb97dec items=0 ppid=1266 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:47:16.976000 audit[1345]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.976000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe7a703070 a2=0 a3=7ffe7a70305c items=0 ppid=1266 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:47:16.978000 audit[1347]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.978000 audit[1347]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc75bd5d50 a2=0 a3=7ffc75bd5d3c items=0 ppid=1266 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:47:16.984000 audit[1350]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.984000 audit[1350]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe80d303a0 a2=0 a3=7ffe80d3038c items=0 ppid=1266 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:47:16.985000 audit[1352]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.985000 audit[1352]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcc6daa530 a2=0 a3=7ffcc6daa51c items=0 ppid=1266 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.985000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:47:16.987000 audit[1354]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.987000 audit[1354]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe6f90e060 a2=0 a3=7ffe6f90e04c items=0 ppid=1266 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:47:16.988000 audit[1356]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.988000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2d2df470 a2=0 a3=7ffc2d2df45c items=0 ppid=1266 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:47:16.989799 systemd-networkd[1018]: docker0: Link UP Feb 12 19:47:16.995000 audit[1360]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.995000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7f507a80 a2=0 a3=7ffc7f507a6c items=0 ppid=1266 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:47:16.996000 audit[1361]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:16.996000 audit[1361]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffea6ceadf0 a2=0 a3=7ffea6ceaddc items=0 ppid=1266 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:16.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:47:16.998482 env[1266]: time="2024-02-12T19:47:16.998441916Z" level=info msg="Loading containers: done." Feb 12 19:47:17.012298 env[1266]: time="2024-02-12T19:47:17.012261820Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:47:17.012439 env[1266]: time="2024-02-12T19:47:17.012414920Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:47:17.012505 env[1266]: time="2024-02-12T19:47:17.012487010Z" level=info msg="Daemon has completed initialization" Feb 12 19:47:17.026376 systemd[1]: Started docker.service. Feb 12 19:47:17.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:17.030389 env[1266]: time="2024-02-12T19:47:17.030348044Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:47:17.045453 systemd[1]: Reloading. Feb 12 19:47:17.102655 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2024-02-12T19:47:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:17.102682 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2024-02-12T19:47:17Z" level=info msg="torcx already run" Feb 12 19:47:17.158483 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:17.158499 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:17.177253 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit: BPF prog-id=31 op=LOAD Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.229000 audit: BPF prog-id=32 op=LOAD Feb 12 19:47:17.229000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:47:17.229000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.230000 audit: BPF prog-id=33 op=LOAD Feb 12 19:47:17.230000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.231000 audit: BPF prog-id=34 op=LOAD Feb 12 19:47:17.231000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.232000 audit: BPF prog-id=35 op=LOAD Feb 12 19:47:17.232000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:47:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit: BPF prog-id=36 op=LOAD Feb 12 19:47:17.234000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit: BPF prog-id=37 op=LOAD Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.234000 audit: BPF prog-id=38 op=LOAD Feb 12 19:47:17.234000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:47:17.234000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit: BPF prog-id=39 op=LOAD Feb 12 19:47:17.235000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit: BPF prog-id=40 op=LOAD Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.235000 audit: BPF prog-id=41 op=LOAD Feb 12 19:47:17.236000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:47:17.236000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit: BPF prog-id=42 op=LOAD Feb 12 19:47:17.236000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit: BPF prog-id=43 op=LOAD Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit: BPF prog-id=44 op=LOAD Feb 12 19:47:17.236000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:47:17.236000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:17.237000 audit: BPF prog-id=45 op=LOAD Feb 12 19:47:17.237000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:47:17.243466 systemd[1]: Started kubelet.service. Feb 12 19:47:17.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:17.293575 kubelet[1452]: E0212 19:47:17.293440 1452 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:47:17.296089 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:47:17.296207 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:47:17.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:17.600500 env[1123]: time="2024-02-12T19:47:17.600385382Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 12 19:47:18.191932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount262005823.mount: Deactivated successfully. Feb 12 19:47:19.798833 env[1123]: time="2024-02-12T19:47:19.798759693Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:19.800405 env[1123]: time="2024-02-12T19:47:19.800381238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:19.801870 env[1123]: time="2024-02-12T19:47:19.801825467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:19.803175 env[1123]: time="2024-02-12T19:47:19.803149294Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:19.803860 env[1123]: time="2024-02-12T19:47:19.803831225Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 12 19:47:19.813291 env[1123]: time="2024-02-12T19:47:19.813260161Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 12 19:47:21.923298 env[1123]: time="2024-02-12T19:47:21.923238275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:21.925253 env[1123]: time="2024-02-12T19:47:21.925213554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:21.926800 env[1123]: time="2024-02-12T19:47:21.926761156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:21.928763 env[1123]: time="2024-02-12T19:47:21.928737905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:21.930935 env[1123]: time="2024-02-12T19:47:21.930883328Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 12 19:47:21.939218 env[1123]: time="2024-02-12T19:47:21.939190529Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 12 19:47:23.432408 env[1123]: time="2024-02-12T19:47:23.432363089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:23.434818 env[1123]: time="2024-02-12T19:47:23.434759976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:23.436155 env[1123]: time="2024-02-12T19:47:23.436120611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:23.437825 env[1123]: time="2024-02-12T19:47:23.437790727Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:23.439870 env[1123]: time="2024-02-12T19:47:23.439836663Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 12 19:47:23.448277 env[1123]: time="2024-02-12T19:47:23.448226507Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:47:24.496493 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1556752679.mount: Deactivated successfully. Feb 12 19:47:25.223294 env[1123]: time="2024-02-12T19:47:25.223241716Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.224826 env[1123]: time="2024-02-12T19:47:25.224801762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.226399 env[1123]: time="2024-02-12T19:47:25.226359136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.227501 env[1123]: time="2024-02-12T19:47:25.227448937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.227807 env[1123]: time="2024-02-12T19:47:25.227765554Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 19:47:25.235845 env[1123]: time="2024-02-12T19:47:25.235814519Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:47:25.714633 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3770694780.mount: Deactivated successfully. Feb 12 19:47:25.719168 env[1123]: time="2024-02-12T19:47:25.719136171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.720756 env[1123]: time="2024-02-12T19:47:25.720716177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.722083 env[1123]: time="2024-02-12T19:47:25.722055534Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.723170 env[1123]: time="2024-02-12T19:47:25.723145998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:25.723572 env[1123]: time="2024-02-12T19:47:25.723546049Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 19:47:25.732640 env[1123]: time="2024-02-12T19:47:25.732621341Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 12 19:47:26.236544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3776958012.mount: Deactivated successfully. Feb 12 19:47:27.366788 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:47:27.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:27.366956 systemd[1]: Stopped kubelet.service. Feb 12 19:47:27.368185 systemd[1]: Started kubelet.service. Feb 12 19:47:27.369590 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 19:47:27.369635 kernel: audit: type=1130 audit(1707767247.366:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:27.369654 kernel: audit: type=1131 audit(1707767247.366:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:27.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:27.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:27.373642 kernel: audit: type=1130 audit(1707767247.367:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:27.408216 kubelet[1509]: E0212 19:47:27.408167 1509 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:47:27.411414 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:47:27.411522 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:47:27.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:27.414788 kernel: audit: type=1131 audit(1707767247.410:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:31.041208 env[1123]: time="2024-02-12T19:47:31.041149003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:31.042754 env[1123]: time="2024-02-12T19:47:31.042705683Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:31.045070 env[1123]: time="2024-02-12T19:47:31.045037443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:31.047174 env[1123]: time="2024-02-12T19:47:31.047113355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:31.048059 env[1123]: time="2024-02-12T19:47:31.047990516Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 12 19:47:31.056052 env[1123]: time="2024-02-12T19:47:31.056025843Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:47:31.543417 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4031336692.mount: Deactivated successfully. Feb 12 19:47:32.166586 env[1123]: time="2024-02-12T19:47:32.166534118Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:32.168279 env[1123]: time="2024-02-12T19:47:32.168240394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:32.169460 env[1123]: time="2024-02-12T19:47:32.169420666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:32.170639 env[1123]: time="2024-02-12T19:47:32.170608258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:32.171062 env[1123]: time="2024-02-12T19:47:32.171035156Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 19:47:34.162072 systemd[1]: Stopped kubelet.service. Feb 12 19:47:34.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:34.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:34.166540 kernel: audit: type=1130 audit(1707767254.161:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:34.166639 kernel: audit: type=1131 audit(1707767254.161:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:34.174158 systemd[1]: Reloading. Feb 12 19:47:34.231666 /usr/lib/systemd/system-generators/torcx-generator[1620]: time="2024-02-12T19:47:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:34.231958 /usr/lib/systemd/system-generators/torcx-generator[1620]: time="2024-02-12T19:47:34Z" level=info msg="torcx already run" Feb 12 19:47:34.291689 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:34.291705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:34.310211 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.366170 kernel: audit: type=1400 audit(1707767254.361:382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.366206 kernel: audit: type=1400 audit(1707767254.361:383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.366233 kernel: audit: type=1400 audit(1707767254.361:384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370075 kernel: audit: type=1400 audit(1707767254.361:385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370100 kernel: audit: type=1400 audit(1707767254.361:386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.372041 kernel: audit: type=1400 audit(1707767254.361:387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.373999 kernel: audit: type=1400 audit(1707767254.361:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.375972 kernel: audit: type=1400 audit(1707767254.361:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit: BPF prog-id=46 op=LOAD Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.369000 audit: BPF prog-id=47 op=LOAD Feb 12 19:47:34.369000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:47:34.369000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.373000 audit: BPF prog-id=48 op=LOAD Feb 12 19:47:34.373000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.375000 audit: BPF prog-id=49 op=LOAD Feb 12 19:47:34.375000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.377000 audit: BPF prog-id=50 op=LOAD Feb 12 19:47:34.377000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit: BPF prog-id=51 op=LOAD Feb 12 19:47:34.378000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit: BPF prog-id=52 op=LOAD Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.378000 audit: BPF prog-id=53 op=LOAD Feb 12 19:47:34.378000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:47:34.378000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit: BPF prog-id=54 op=LOAD Feb 12 19:47:34.380000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit: BPF prog-id=55 op=LOAD Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit: BPF prog-id=56 op=LOAD Feb 12 19:47:34.380000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:47:34.380000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit: BPF prog-id=57 op=LOAD Feb 12 19:47:34.380000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit: BPF prog-id=58 op=LOAD Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.380000 audit: BPF prog-id=59 op=LOAD Feb 12 19:47:34.380000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:47:34.380000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.381000 audit: BPF prog-id=60 op=LOAD Feb 12 19:47:34.381000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:47:34.391762 systemd[1]: Started kubelet.service. Feb 12 19:47:34.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:34.432622 kubelet[1661]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:34.432942 kubelet[1661]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:47:34.432942 kubelet[1661]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:34.432942 kubelet[1661]: I0212 19:47:34.432922 1661 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:47:34.805176 kubelet[1661]: I0212 19:47:34.805111 1661 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:47:34.805176 kubelet[1661]: I0212 19:47:34.805139 1661 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:47:34.805385 kubelet[1661]: I0212 19:47:34.805366 1661 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:47:34.808306 kubelet[1661]: I0212 19:47:34.808279 1661 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:47:34.809140 kubelet[1661]: E0212 19:47:34.809119 1661 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.138:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.816154 kubelet[1661]: I0212 19:47:34.816127 1661 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:47:34.816303 kubelet[1661]: I0212 19:47:34.816284 1661 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:47:34.816828 kubelet[1661]: I0212 19:47:34.816812 1661 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:47:34.816930 kubelet[1661]: I0212 19:47:34.816833 1661 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:47:34.816930 kubelet[1661]: I0212 19:47:34.816842 1661 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:47:34.816986 kubelet[1661]: I0212 19:47:34.816935 1661 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:34.817016 kubelet[1661]: I0212 19:47:34.817010 1661 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:47:34.817042 kubelet[1661]: I0212 19:47:34.817026 1661 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:47:34.817065 kubelet[1661]: I0212 19:47:34.817047 1661 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:47:34.817065 kubelet[1661]: I0212 19:47:34.817060 1661 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:47:34.817560 kubelet[1661]: W0212 19:47:34.817524 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.138:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.817605 kubelet[1661]: E0212 19:47:34.817566 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.138:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.817698 kubelet[1661]: I0212 19:47:34.817659 1661 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:47:34.817844 kubelet[1661]: W0212 19:47:34.817585 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.138:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.817844 kubelet[1661]: E0212 19:47:34.817833 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.138:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.817954 kubelet[1661]: W0212 19:47:34.817938 1661 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:47:34.818382 kubelet[1661]: I0212 19:47:34.818361 1661 server.go:1232] "Started kubelet" Feb 12 19:47:34.819029 kubelet[1661]: E0212 19:47:34.818737 1661 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b33545267dc7ec", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 47, 34, 818342892, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 47, 34, 818342892, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://10.0.0.138:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.138:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:47:34.819125 kubelet[1661]: I0212 19:47:34.819102 1661 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:47:34.818000 audit[1661]: AVC avc: denied { mac_admin } for pid=1661 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.818000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:34.818000 audit[1661]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f68a0 a1=c00050dbf0 a2=c0008f6870 a3=25 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.818000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:34.818000 audit[1661]: AVC avc: denied { mac_admin } for pid=1661 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.818000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:34.818000 audit[1661]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004ffa60 a1=c00050dc08 a2=c0008f6930 a3=25 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.818000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:34.820514 kubelet[1661]: I0212 19:47:34.820206 1661 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:47:34.820514 kubelet[1661]: I0212 19:47:34.820243 1661 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:47:34.820514 kubelet[1661]: I0212 19:47:34.820299 1661 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:47:34.820600 kubelet[1661]: I0212 19:47:34.820586 1661 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:47:34.820637 kubelet[1661]: I0212 19:47:34.820627 1661 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:47:34.821000 audit[1673]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.821000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcdf7dbe80 a2=0 a3=7ffcdf7dbe6c items=0 ppid=1661 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:47:34.823953 kubelet[1661]: I0212 19:47:34.823933 1661 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:47:34.822000 audit[1674]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.822000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6dd00ab0 a2=0 a3=7ffe6dd00a9c items=0 ppid=1661 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:47:34.824435 kubelet[1661]: E0212 19:47:34.824184 1661 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:47:34.824435 kubelet[1661]: E0212 19:47:34.824208 1661 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:47:34.824577 kubelet[1661]: E0212 19:47:34.824549 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:34.824577 kubelet[1661]: I0212 19:47:34.824575 1661 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:47:34.824863 kubelet[1661]: I0212 19:47:34.824843 1661 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:47:34.824952 kubelet[1661]: I0212 19:47:34.824880 1661 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:47:34.825049 kubelet[1661]: E0212 19:47:34.824948 1661 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.138:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.138:6443: connect: connection refused" interval="200ms" Feb 12 19:47:34.825197 kubelet[1661]: W0212 19:47:34.825091 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.138:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.825197 kubelet[1661]: E0212 19:47:34.825122 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.138:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.825000 audit[1676]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.825000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe47a8d5c0 a2=0 a3=7ffe47a8d5ac items=0 ppid=1661 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:47:34.827000 audit[1678]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.827000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff34f4b110 a2=0 a3=7fff34f4b0fc items=0 ppid=1661 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:47:34.830000 audit[1681]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.830000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeecb11b50 a2=0 a3=7ffeecb11b3c items=0 ppid=1661 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:47:34.832929 kubelet[1661]: I0212 19:47:34.832914 1661 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:47:34.831000 audit[1682]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:34.831000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5bf9aa80 a2=0 a3=7ffd5bf9aa6c items=0 ppid=1661 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:47:34.833738 kubelet[1661]: I0212 19:47:34.833724 1661 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:47:34.833786 kubelet[1661]: I0212 19:47:34.833744 1661 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:47:34.833786 kubelet[1661]: I0212 19:47:34.833758 1661 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:47:34.833838 kubelet[1661]: E0212 19:47:34.833811 1661 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:47:34.832000 audit[1684]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.832000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe03488750 a2=0 a3=7ffe0348873c items=0 ppid=1661 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:47:34.833000 audit[1685]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.833000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffda040270 a2=0 a3=7fffda04025c items=0 ppid=1661 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:47:34.834000 audit[1686]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:34.834000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe858ef030 a2=0 a3=7ffe858ef01c items=0 ppid=1661 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:47:34.834000 audit[1687]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:34.834000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebad5b590 a2=0 a3=7ffebad5b57c items=0 ppid=1661 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:47:34.835000 audit[1688]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:34.835000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd1f91a80 a2=0 a3=7fffd1f91a6c items=0 ppid=1661 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:47:34.836000 audit[1689]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:34.836000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd83d05350 a2=0 a3=7ffd83d0533c items=0 ppid=1661 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:47:34.838887 kubelet[1661]: W0212 19:47:34.838836 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.138:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.838933 kubelet[1661]: E0212 19:47:34.838894 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.138:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:34.841197 kubelet[1661]: I0212 19:47:34.841180 1661 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:47:34.841197 kubelet[1661]: I0212 19:47:34.841195 1661 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:47:34.841271 kubelet[1661]: I0212 19:47:34.841216 1661 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:34.844224 kubelet[1661]: I0212 19:47:34.844204 1661 policy_none.go:49] "None policy: Start" Feb 12 19:47:34.844679 kubelet[1661]: I0212 19:47:34.844659 1661 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:47:34.844679 kubelet[1661]: I0212 19:47:34.844679 1661 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:47:34.849832 systemd[1]: Created slice kubepods.slice. Feb 12 19:47:34.853067 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:47:34.855214 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:47:34.867258 kubelet[1661]: I0212 19:47:34.867225 1661 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:47:34.865000 audit[1661]: AVC avc: denied { mac_admin } for pid=1661 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:34.865000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:34.865000 audit[1661]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fb63c0 a1=c000ef5c68 a2=c000fb6390 a3=25 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:34.865000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:34.867464 kubelet[1661]: I0212 19:47:34.867268 1661 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:47:34.867464 kubelet[1661]: I0212 19:47:34.867393 1661 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:47:34.867793 kubelet[1661]: E0212 19:47:34.867761 1661 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 19:47:34.926363 kubelet[1661]: I0212 19:47:34.926345 1661 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:47:34.926625 kubelet[1661]: E0212 19:47:34.926606 1661 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.138:6443/api/v1/nodes\": dial tcp 10.0.0.138:6443: connect: connection refused" node="localhost" Feb 12 19:47:34.934693 kubelet[1661]: I0212 19:47:34.934671 1661 topology_manager.go:215] "Topology Admit Handler" podUID="34e2c5f5f0e84a57b87a0dd3beb6b13a" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 12 19:47:34.935345 kubelet[1661]: I0212 19:47:34.935323 1661 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 12 19:47:34.935899 kubelet[1661]: I0212 19:47:34.935879 1661 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 12 19:47:34.939397 systemd[1]: Created slice kubepods-burstable-pod34e2c5f5f0e84a57b87a0dd3beb6b13a.slice. Feb 12 19:47:34.949620 systemd[1]: Created slice kubepods-burstable-pod212dcc5e2f08bec92c239ac5786b7e2b.slice. Feb 12 19:47:34.961265 systemd[1]: Created slice kubepods-burstable-podd0325d16aab19669b5fea4b6623890e6.slice. Feb 12 19:47:35.026030 kubelet[1661]: E0212 19:47:35.026008 1661 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.138:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.138:6443: connect: connection refused" interval="400ms" Feb 12 19:47:35.126306 kubelet[1661]: I0212 19:47:35.126279 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:35.126398 kubelet[1661]: I0212 19:47:35.126318 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:47:35.126398 kubelet[1661]: I0212 19:47:35.126338 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/34e2c5f5f0e84a57b87a0dd3beb6b13a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"34e2c5f5f0e84a57b87a0dd3beb6b13a\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:35.126398 kubelet[1661]: I0212 19:47:35.126355 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/34e2c5f5f0e84a57b87a0dd3beb6b13a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"34e2c5f5f0e84a57b87a0dd3beb6b13a\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:35.126398 kubelet[1661]: I0212 19:47:35.126373 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:35.126484 kubelet[1661]: I0212 19:47:35.126406 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/34e2c5f5f0e84a57b87a0dd3beb6b13a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"34e2c5f5f0e84a57b87a0dd3beb6b13a\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:35.126484 kubelet[1661]: I0212 19:47:35.126454 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:35.126484 kubelet[1661]: I0212 19:47:35.126481 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:35.126548 kubelet[1661]: I0212 19:47:35.126500 1661 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:35.127854 kubelet[1661]: I0212 19:47:35.127826 1661 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:47:35.128164 kubelet[1661]: E0212 19:47:35.128138 1661 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.138:6443/api/v1/nodes\": dial tcp 10.0.0.138:6443: connect: connection refused" node="localhost" Feb 12 19:47:35.248740 kubelet[1661]: E0212 19:47:35.248723 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:35.249218 env[1123]: time="2024-02-12T19:47:35.249183064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:34e2c5f5f0e84a57b87a0dd3beb6b13a,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:35.260423 kubelet[1661]: E0212 19:47:35.260405 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:35.260722 env[1123]: time="2024-02-12T19:47:35.260684641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:35.262873 kubelet[1661]: E0212 19:47:35.262842 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:35.263162 env[1123]: time="2024-02-12T19:47:35.263130144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:35.427154 kubelet[1661]: E0212 19:47:35.427094 1661 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.138:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.138:6443: connect: connection refused" interval="800ms" Feb 12 19:47:35.529277 kubelet[1661]: I0212 19:47:35.529261 1661 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:47:35.529787 kubelet[1661]: E0212 19:47:35.529751 1661 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.138:6443/api/v1/nodes\": dial tcp 10.0.0.138:6443: connect: connection refused" node="localhost" Feb 12 19:47:35.636577 kubelet[1661]: W0212 19:47:35.636527 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.138:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:35.636625 kubelet[1661]: E0212 19:47:35.636584 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.138:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:35.643939 kubelet[1661]: W0212 19:47:35.643919 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.138:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:35.643939 kubelet[1661]: E0212 19:47:35.643941 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.138:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:35.772640 kubelet[1661]: W0212 19:47:35.772550 1661 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.138:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:35.772640 kubelet[1661]: E0212 19:47:35.772608 1661 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.138:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.138:6443: connect: connection refused Feb 12 19:47:35.777621 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3623013085.mount: Deactivated successfully. Feb 12 19:47:35.781517 env[1123]: time="2024-02-12T19:47:35.781482447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.783849 env[1123]: time="2024-02-12T19:47:35.783811421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.785198 env[1123]: time="2024-02-12T19:47:35.785170993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.785955 env[1123]: time="2024-02-12T19:47:35.785926438Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.787451 env[1123]: time="2024-02-12T19:47:35.787419261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.788400 env[1123]: time="2024-02-12T19:47:35.788379130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.789552 env[1123]: time="2024-02-12T19:47:35.789522128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.792306 env[1123]: time="2024-02-12T19:47:35.792269253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.793447 env[1123]: time="2024-02-12T19:47:35.793412912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.795868 env[1123]: time="2024-02-12T19:47:35.795835277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.797621 env[1123]: time="2024-02-12T19:47:35.797592266Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.798190 env[1123]: time="2024-02-12T19:47:35.798155237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:35.814676 env[1123]: time="2024-02-12T19:47:35.814617240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:35.814800 env[1123]: time="2024-02-12T19:47:35.814661102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:35.814800 env[1123]: time="2024-02-12T19:47:35.814671468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:35.814880 env[1123]: time="2024-02-12T19:47:35.814792659Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4363545ffe24a32ac941514cca3aff7b03cfcaf14a0a26885871181f0e76275a pid=1702 runtime=io.containerd.runc.v2 Feb 12 19:47:35.822331 env[1123]: time="2024-02-12T19:47:35.822212101Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:35.822331 env[1123]: time="2024-02-12T19:47:35.822273970Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:35.822331 env[1123]: time="2024-02-12T19:47:35.822293119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:35.822428 env[1123]: time="2024-02-12T19:47:35.822388914Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/081df5a14d6d51e142a17cad95c3c06580e70c6037b40c82d4a446f527d74edb pid=1720 runtime=io.containerd.runc.v2 Feb 12 19:47:35.822697 env[1123]: time="2024-02-12T19:47:35.822637862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:35.822697 env[1123]: time="2024-02-12T19:47:35.822671999Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:35.822828 env[1123]: time="2024-02-12T19:47:35.822681844Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:35.823042 env[1123]: time="2024-02-12T19:47:35.822992109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06fcffd5dd9ffa815965579dc2a812c8f7fd2d4eeaecd9037e9c79c7387e7a18 pid=1730 runtime=io.containerd.runc.v2 Feb 12 19:47:35.833197 systemd[1]: Started cri-containerd-081df5a14d6d51e142a17cad95c3c06580e70c6037b40c82d4a446f527d74edb.scope. Feb 12 19:47:35.836590 systemd[1]: Started cri-containerd-4363545ffe24a32ac941514cca3aff7b03cfcaf14a0a26885871181f0e76275a.scope. Feb 12 19:47:35.839860 systemd[1]: Started cri-containerd-06fcffd5dd9ffa815965579dc2a812c8f7fd2d4eeaecd9037e9c79c7387e7a18.scope. Feb 12 19:47:35.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit: BPF prog-id=61 op=LOAD Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1730 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666366666435646439666661383135393635353739646332613831 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1730 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666366666435646439666661383135393635353739646332613831 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit: BPF prog-id=62 op=LOAD Feb 12 19:47:35.849000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000999c0 items=0 ppid=1730 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666366666435646439666661383135393635353739646332613831 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.849000 audit: BPF prog-id=63 op=LOAD Feb 12 19:47:35.849000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099a08 items=0 ppid=1730 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666366666435646439666661383135393635353739646332613831 Feb 12 19:47:35.850000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:47:35.850000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit: BPF prog-id=64 op=LOAD Feb 12 19:47:35.850000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099e18 items=0 ppid=1730 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666366666435646439666661383135393635353739646332613831 Feb 12 19:47:35.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit: BPF prog-id=65 op=LOAD Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1702 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363335343566666532346133326163393431353134636361336166 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1702 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363335343566666532346133326163393431353134636361336166 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.850000 audit: BPF prog-id=66 op=LOAD Feb 12 19:47:35.850000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e8170 items=0 ppid=1702 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363335343566666532346133326163393431353134636361336166 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit: BPF prog-id=67 op=LOAD Feb 12 19:47:35.851000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e81b8 items=0 ppid=1702 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363335343566666532346133326163393431353134636361336166 Feb 12 19:47:35.851000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:47:35.851000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { perfmon } for pid=1722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit[1722]: AVC avc: denied { bpf } for pid=1722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit: BPF prog-id=68 op=LOAD Feb 12 19:47:35.851000 audit[1722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e85c8 items=0 ppid=1702 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363335343566666532346133326163393431353134636361336166 Feb 12 19:47:35.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.851000 audit: BPF prog-id=69 op=LOAD Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038316466356131346436643531653134326131376361643935633363 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038316466356131346436643531653134326131376361643935633363 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.853000 audit: BPF prog-id=70 op=LOAD Feb 12 19:47:35.853000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031dc90 items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038316466356131346436643531653134326131376361643935633363 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.854000 audit: BPF prog-id=71 op=LOAD Feb 12 19:47:35.854000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031dcd8 items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038316466356131346436643531653134326131376361643935633363 Feb 12 19:47:35.854000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:47:35.855000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.855000 audit: BPF prog-id=72 op=LOAD Feb 12 19:47:35.855000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003940e8 items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038316466356131346436643531653134326131376361643935633363 Feb 12 19:47:35.880062 env[1123]: time="2024-02-12T19:47:35.879988917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:34e2c5f5f0e84a57b87a0dd3beb6b13a,Namespace:kube-system,Attempt:0,} returns sandbox id \"081df5a14d6d51e142a17cad95c3c06580e70c6037b40c82d4a446f527d74edb\"" Feb 12 19:47:35.880733 kubelet[1661]: E0212 19:47:35.880706 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:35.882977 env[1123]: time="2024-02-12T19:47:35.882934912Z" level=info msg="CreateContainer within sandbox \"081df5a14d6d51e142a17cad95c3c06580e70c6037b40c82d4a446f527d74edb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:47:35.883128 env[1123]: time="2024-02-12T19:47:35.883088937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"4363545ffe24a32ac941514cca3aff7b03cfcaf14a0a26885871181f0e76275a\"" Feb 12 19:47:35.884372 kubelet[1661]: E0212 19:47:35.884355 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:35.886378 env[1123]: time="2024-02-12T19:47:35.886224407Z" level=info msg="CreateContainer within sandbox \"4363545ffe24a32ac941514cca3aff7b03cfcaf14a0a26885871181f0e76275a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:47:35.899726 env[1123]: time="2024-02-12T19:47:35.899681062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,} returns sandbox id \"06fcffd5dd9ffa815965579dc2a812c8f7fd2d4eeaecd9037e9c79c7387e7a18\"" Feb 12 19:47:35.900612 kubelet[1661]: E0212 19:47:35.900442 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:35.902049 env[1123]: time="2024-02-12T19:47:35.902005976Z" level=info msg="CreateContainer within sandbox \"06fcffd5dd9ffa815965579dc2a812c8f7fd2d4eeaecd9037e9c79c7387e7a18\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:47:35.905058 env[1123]: time="2024-02-12T19:47:35.905031765Z" level=info msg="CreateContainer within sandbox \"4363545ffe24a32ac941514cca3aff7b03cfcaf14a0a26885871181f0e76275a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"fc80ef6cb9e9ffdb759e9d67e97e8bf81382821679ca761a5673b45eff00da6b\"" Feb 12 19:47:35.905517 env[1123]: time="2024-02-12T19:47:35.905497037Z" level=info msg="StartContainer for \"fc80ef6cb9e9ffdb759e9d67e97e8bf81382821679ca761a5673b45eff00da6b\"" Feb 12 19:47:35.911926 env[1123]: time="2024-02-12T19:47:35.911885179Z" level=info msg="CreateContainer within sandbox \"081df5a14d6d51e142a17cad95c3c06580e70c6037b40c82d4a446f527d74edb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0256920cc71ccbb3fd7ddc74ebd442e313ebbaa98d29f2779285e291565ab2ce\"" Feb 12 19:47:35.912297 env[1123]: time="2024-02-12T19:47:35.912278065Z" level=info msg="StartContainer for \"0256920cc71ccbb3fd7ddc74ebd442e313ebbaa98d29f2779285e291565ab2ce\"" Feb 12 19:47:35.919555 systemd[1]: Started cri-containerd-fc80ef6cb9e9ffdb759e9d67e97e8bf81382821679ca761a5673b45eff00da6b.scope. Feb 12 19:47:35.924640 env[1123]: time="2024-02-12T19:47:35.924605156Z" level=info msg="CreateContainer within sandbox \"06fcffd5dd9ffa815965579dc2a812c8f7fd2d4eeaecd9037e9c79c7387e7a18\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4c54fe32115cf719c45a1f7d8adaf0041988fbaba5f1aa90fbaa867dae64685c\"" Feb 12 19:47:35.924967 env[1123]: time="2024-02-12T19:47:35.924930028Z" level=info msg="StartContainer for \"4c54fe32115cf719c45a1f7d8adaf0041988fbaba5f1aa90fbaa867dae64685c\"" Feb 12 19:47:35.928550 systemd[1]: Started cri-containerd-0256920cc71ccbb3fd7ddc74ebd442e313ebbaa98d29f2779285e291565ab2ce.scope. Feb 12 19:47:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.932000 audit: BPF prog-id=73 op=LOAD Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1702 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383065663663623965396666646237353965396436376539376538 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1702 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383065663663623965396666646237353965396436376539376538 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit: BPF prog-id=74 op=LOAD Feb 12 19:47:35.933000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000212e30 items=0 ppid=1702 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383065663663623965396666646237353965396436376539376538 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit: BPF prog-id=75 op=LOAD Feb 12 19:47:35.933000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212e78 items=0 ppid=1702 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383065663663623965396666646237353965396436376539376538 Feb 12 19:47:35.933000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:47:35.933000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.933000 audit: BPF prog-id=76 op=LOAD Feb 12 19:47:35.933000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000213288 items=0 ppid=1702 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383065663663623965396666646237353965396436376539376538 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.937000 audit: BPF prog-id=77 op=LOAD Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1720 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353639323063633731636362623366643764646337346562643434 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1720 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353639323063633731636362623366643764646337346562643434 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit: BPF prog-id=78 op=LOAD Feb 12 19:47:35.938000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00037cd50 items=0 ppid=1720 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353639323063633731636362623366643764646337346562643434 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit: BPF prog-id=79 op=LOAD Feb 12 19:47:35.938000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00037cd98 items=0 ppid=1720 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353639323063633731636362623366643764646337346562643434 Feb 12 19:47:35.938000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:47:35.938000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { perfmon } for pid=1846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit[1846]: AVC avc: denied { bpf } for pid=1846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.938000 audit: BPF prog-id=80 op=LOAD Feb 12 19:47:35.938000 audit[1846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037d1a8 items=0 ppid=1720 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032353639323063633731636362623366643764646337346562643434 Feb 12 19:47:35.949160 systemd[1]: Started cri-containerd-4c54fe32115cf719c45a1f7d8adaf0041988fbaba5f1aa90fbaa867dae64685c.scope. Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.963000 audit: BPF prog-id=81 op=LOAD Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1730 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353466653332313135636637313963343561316637643861646166 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1730 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353466653332313135636637313963343561316637643861646166 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit: BPF prog-id=82 op=LOAD Feb 12 19:47:35.965000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009b0f0 items=0 ppid=1730 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353466653332313135636637313963343561316637643861646166 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.965000 audit: BPF prog-id=83 op=LOAD Feb 12 19:47:35.965000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009b138 items=0 ppid=1730 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353466653332313135636637313963343561316637643861646166 Feb 12 19:47:35.966000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:47:35.966000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:35.966000 audit: BPF prog-id=84 op=LOAD Feb 12 19:47:35.966000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b548 items=0 ppid=1730 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:35.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353466653332313135636637313963343561316637643861646166 Feb 12 19:47:35.970456 env[1123]: time="2024-02-12T19:47:35.969461380Z" level=info msg="StartContainer for \"0256920cc71ccbb3fd7ddc74ebd442e313ebbaa98d29f2779285e291565ab2ce\" returns successfully" Feb 12 19:47:35.974780 env[1123]: time="2024-02-12T19:47:35.972240298Z" level=info msg="StartContainer for \"fc80ef6cb9e9ffdb759e9d67e97e8bf81382821679ca761a5673b45eff00da6b\" returns successfully" Feb 12 19:47:35.992934 env[1123]: time="2024-02-12T19:47:35.992893724Z" level=info msg="StartContainer for \"4c54fe32115cf719c45a1f7d8adaf0041988fbaba5f1aa90fbaa867dae64685c\" returns successfully" Feb 12 19:47:36.331652 kubelet[1661]: I0212 19:47:36.331619 1661 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:47:36.708000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.708000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ad2000 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:36.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:36.708000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.708000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001d3520 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:36.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:36.844808 kubelet[1661]: E0212 19:47:36.844771 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:36.847388 kubelet[1661]: E0212 19:47:36.847357 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:36.849076 kubelet[1661]: E0212 19:47:36.849048 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:36.948000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.948000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005efca20 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:47:36.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:47:36.948000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.948000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00681c030 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:47:36.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:47:36.949000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.949000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0069be090 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:47:36.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:47:36.949000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.949000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006ca59e0 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:47:36.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:47:36.979000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.979000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c003e211a0 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:47:36.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:47:36.980000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:36.980000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0069bf350 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:47:36.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:47:36.998631 kubelet[1661]: E0212 19:47:36.998598 1661 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 12 19:47:37.078538 kubelet[1661]: I0212 19:47:37.078504 1661 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:47:37.085820 kubelet[1661]: E0212 19:47:37.085790 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.186287 kubelet[1661]: E0212 19:47:37.186266 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.286872 kubelet[1661]: E0212 19:47:37.286746 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.387881 kubelet[1661]: E0212 19:47:37.387854 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.488372 kubelet[1661]: E0212 19:47:37.488336 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.588892 kubelet[1661]: E0212 19:47:37.588809 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.689319 kubelet[1661]: E0212 19:47:37.689280 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.789838 kubelet[1661]: E0212 19:47:37.789811 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:37.850986 kubelet[1661]: E0212 19:47:37.850925 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:37.890884 kubelet[1661]: E0212 19:47:37.890858 1661 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:47:38.821502 kubelet[1661]: I0212 19:47:38.821465 1661 apiserver.go:52] "Watching apiserver" Feb 12 19:47:38.825476 kubelet[1661]: I0212 19:47:38.825454 1661 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:47:38.856165 kubelet[1661]: E0212 19:47:38.856139 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:39.205142 kubelet[1661]: E0212 19:47:39.205120 1661 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:39.450553 systemd[1]: Reloading. Feb 12 19:47:39.513424 /usr/lib/systemd/system-generators/torcx-generator[1963]: time="2024-02-12T19:47:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:39.513452 /usr/lib/systemd/system-generators/torcx-generator[1963]: time="2024-02-12T19:47:39Z" level=info msg="torcx already run" Feb 12 19:47:39.573341 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:39.573358 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:39.592052 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665696 kernel: kauditd_printk_skb: 579 callbacks suppressed Feb 12 19:47:39.665838 kernel: audit: type=1400 audit(1707767259.654:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665869 kernel: audit: type=1400 audit(1707767259.654:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665890 kernel: audit: type=1400 audit(1707767259.654:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665907 kernel: audit: type=1400 audit(1707767259.654:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665922 kernel: audit: type=1400 audit(1707767259.654:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670237 kernel: audit: type=1400 audit(1707767259.654:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670298 kernel: audit: type=1400 audit(1707767259.654:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670320 kernel: audit: type=1400 audit(1707767259.654:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.672142 kernel: audit: type=1400 audit(1707767259.657:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674041 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:47:39.657000 audit: BPF prog-id=85 op=LOAD Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.658000 audit: BPF prog-id=86 op=LOAD Feb 12 19:47:39.658000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:47:39.658000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.662000 audit: BPF prog-id=87 op=LOAD Feb 12 19:47:39.662000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.664000 audit: BPF prog-id=88 op=LOAD Feb 12 19:47:39.664000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.669000 audit: BPF prog-id=89 op=LOAD Feb 12 19:47:39.669000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.671000 audit: BPF prog-id=90 op=LOAD Feb 12 19:47:39.671000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:47:39.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.673000 audit: BPF prog-id=91 op=LOAD Feb 12 19:47:39.674000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.674000 audit: BPF prog-id=92 op=LOAD Feb 12 19:47:39.674000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit: BPF prog-id=93 op=LOAD Feb 12 19:47:39.675000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit: BPF prog-id=94 op=LOAD Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit: BPF prog-id=95 op=LOAD Feb 12 19:47:39.676000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:47:39.676000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.676000 audit: BPF prog-id=96 op=LOAD Feb 12 19:47:39.676000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit: BPF prog-id=97 op=LOAD Feb 12 19:47:39.678000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit: BPF prog-id=98 op=LOAD Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit: BPF prog-id=99 op=LOAD Feb 12 19:47:39.678000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:47:39.678000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit: BPF prog-id=100 op=LOAD Feb 12 19:47:39.678000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.678000 audit: BPF prog-id=101 op=LOAD Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit: BPF prog-id=102 op=LOAD Feb 12 19:47:39.679000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:47:39.679000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.679000 audit: BPF prog-id=103 op=LOAD Feb 12 19:47:39.679000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit: BPF prog-id=104 op=LOAD Feb 12 19:47:39.680000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.681000 audit: BPF prog-id=105 op=LOAD Feb 12 19:47:39.681000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:47:39.691216 systemd[1]: Stopping kubelet.service... Feb 12 19:47:39.714999 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:47:39.715188 systemd[1]: Stopped kubelet.service. Feb 12 19:47:39.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:39.716721 systemd[1]: Started kubelet.service. Feb 12 19:47:39.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:39.762918 kubelet[2003]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:39.762918 kubelet[2003]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:47:39.762918 kubelet[2003]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:39.763264 kubelet[2003]: I0212 19:47:39.762985 2003 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:47:39.768228 kubelet[2003]: I0212 19:47:39.768163 2003 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:47:39.768228 kubelet[2003]: I0212 19:47:39.768180 2003 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:47:39.768373 kubelet[2003]: I0212 19:47:39.768354 2003 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:47:39.769905 kubelet[2003]: I0212 19:47:39.769889 2003 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:47:39.771626 kubelet[2003]: I0212 19:47:39.771601 2003 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:47:39.776746 kubelet[2003]: I0212 19:47:39.776725 2003 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:47:39.776920 kubelet[2003]: I0212 19:47:39.776905 2003 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:47:39.777079 kubelet[2003]: I0212 19:47:39.777052 2003 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:47:39.777079 kubelet[2003]: I0212 19:47:39.777079 2003 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:47:39.777239 kubelet[2003]: I0212 19:47:39.777088 2003 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:47:39.777239 kubelet[2003]: I0212 19:47:39.777116 2003 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:39.777239 kubelet[2003]: I0212 19:47:39.777192 2003 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:47:39.777239 kubelet[2003]: I0212 19:47:39.777204 2003 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:47:39.777239 kubelet[2003]: I0212 19:47:39.777238 2003 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:47:39.777351 kubelet[2003]: I0212 19:47:39.777263 2003 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:47:39.778530 kubelet[2003]: I0212 19:47:39.778492 2003 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:47:39.779350 kubelet[2003]: I0212 19:47:39.779312 2003 server.go:1232] "Started kubelet" Feb 12 19:47:39.780118 kubelet[2003]: I0212 19:47:39.780098 2003 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:47:39.780588 kubelet[2003]: I0212 19:47:39.780556 2003 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:47:39.780794 kubelet[2003]: I0212 19:47:39.780781 2003 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:47:39.780000 audit[2003]: AVC avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.780000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:39.781788 kubelet[2003]: I0212 19:47:39.781748 2003 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:47:39.780000 audit[2003]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d687b0 a1=c000e400a8 a2=c000d68780 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:39.780000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:39.783814 kubelet[2003]: I0212 19:47:39.783755 2003 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:47:39.783000 audit[2003]: AVC avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.783000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:39.783000 audit[2003]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dffe60 a1=c000f1a1f8 a2=c000cd3fb0 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:39.783000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:39.784009 kubelet[2003]: I0212 19:47:39.783858 2003 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:47:39.784009 kubelet[2003]: I0212 19:47:39.783886 2003 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:47:39.788310 kubelet[2003]: E0212 19:47:39.788295 2003 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:47:39.788395 kubelet[2003]: E0212 19:47:39.788381 2003 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:47:39.790444 kubelet[2003]: I0212 19:47:39.790421 2003 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:47:39.793576 kubelet[2003]: I0212 19:47:39.793550 2003 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:47:39.793869 kubelet[2003]: I0212 19:47:39.793831 2003 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:47:39.808685 kubelet[2003]: I0212 19:47:39.808650 2003 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:47:39.810274 kubelet[2003]: I0212 19:47:39.810249 2003 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:47:39.810319 kubelet[2003]: I0212 19:47:39.810283 2003 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:47:39.810319 kubelet[2003]: I0212 19:47:39.810302 2003 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:47:39.810373 kubelet[2003]: E0212 19:47:39.810345 2003 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:47:39.834362 kubelet[2003]: I0212 19:47:39.834342 2003 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:47:39.834512 kubelet[2003]: I0212 19:47:39.834502 2003 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:47:39.834591 kubelet[2003]: I0212 19:47:39.834578 2003 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:39.834824 kubelet[2003]: I0212 19:47:39.834813 2003 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:47:39.834908 kubelet[2003]: I0212 19:47:39.834894 2003 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 12 19:47:39.834984 kubelet[2003]: I0212 19:47:39.834970 2003 policy_none.go:49] "None policy: Start" Feb 12 19:47:39.835601 kubelet[2003]: I0212 19:47:39.835592 2003 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:47:39.835677 kubelet[2003]: I0212 19:47:39.835665 2003 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:47:39.835871 kubelet[2003]: I0212 19:47:39.835859 2003 state_mem.go:75] "Updated machine memory state" Feb 12 19:47:39.838965 kubelet[2003]: I0212 19:47:39.838954 2003 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:47:39.838000 audit[2003]: AVC avc: denied { mac_admin } for pid=2003 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:39.838000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:39.838000 audit[2003]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c6b9e0 a1=c00121fd88 a2=c000c6b9b0 a3=25 items=0 ppid=1 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:39.838000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:39.839393 kubelet[2003]: I0212 19:47:39.839369 2003 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:47:39.839606 kubelet[2003]: I0212 19:47:39.839594 2003 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:47:39.893148 kubelet[2003]: I0212 19:47:39.893114 2003 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:47:39.899330 kubelet[2003]: I0212 19:47:39.899304 2003 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 19:47:39.899405 kubelet[2003]: I0212 19:47:39.899357 2003 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:47:39.911084 kubelet[2003]: I0212 19:47:39.911047 2003 topology_manager.go:215] "Topology Admit Handler" podUID="34e2c5f5f0e84a57b87a0dd3beb6b13a" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 12 19:47:39.911189 kubelet[2003]: I0212 19:47:39.911131 2003 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 12 19:47:39.911189 kubelet[2003]: I0212 19:47:39.911162 2003 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 12 19:47:39.917054 kubelet[2003]: E0212 19:47:39.917032 2003 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Feb 12 19:47:39.917378 kubelet[2003]: E0212 19:47:39.917350 2003 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:40.095385 kubelet[2003]: I0212 19:47:40.095274 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/34e2c5f5f0e84a57b87a0dd3beb6b13a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"34e2c5f5f0e84a57b87a0dd3beb6b13a\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:40.095385 kubelet[2003]: I0212 19:47:40.095311 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:40.095385 kubelet[2003]: I0212 19:47:40.095332 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:40.095385 kubelet[2003]: I0212 19:47:40.095348 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/34e2c5f5f0e84a57b87a0dd3beb6b13a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"34e2c5f5f0e84a57b87a0dd3beb6b13a\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:40.095385 kubelet[2003]: I0212 19:47:40.095367 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/34e2c5f5f0e84a57b87a0dd3beb6b13a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"34e2c5f5f0e84a57b87a0dd3beb6b13a\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:47:40.095614 kubelet[2003]: I0212 19:47:40.095383 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:40.095614 kubelet[2003]: I0212 19:47:40.095406 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:40.095614 kubelet[2003]: I0212 19:47:40.095426 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:47:40.095614 kubelet[2003]: I0212 19:47:40.095477 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:47:40.218002 kubelet[2003]: E0212 19:47:40.217976 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:40.218239 kubelet[2003]: E0212 19:47:40.218210 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:40.218284 kubelet[2003]: E0212 19:47:40.218254 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:40.777866 kubelet[2003]: I0212 19:47:40.777827 2003 apiserver.go:52] "Watching apiserver" Feb 12 19:47:40.794035 kubelet[2003]: I0212 19:47:40.793993 2003 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:47:40.818145 kubelet[2003]: E0212 19:47:40.818113 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:40.818307 kubelet[2003]: E0212 19:47:40.818174 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:40.818441 kubelet[2003]: E0212 19:47:40.818399 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:40.842384 kubelet[2003]: I0212 19:47:40.842347 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.842316178 podCreationTimestamp="2024-02-12 19:47:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:40.83698529 +0000 UTC m=+1.117252911" watchObservedRunningTime="2024-02-12 19:47:40.842316178 +0000 UTC m=+1.122583789" Feb 12 19:47:40.842512 kubelet[2003]: I0212 19:47:40.842425 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.842409855 podCreationTimestamp="2024-02-12 19:47:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:40.842222994 +0000 UTC m=+1.122490615" watchObservedRunningTime="2024-02-12 19:47:40.842409855 +0000 UTC m=+1.122677466" Feb 12 19:47:40.877712 kubelet[2003]: I0212 19:47:40.877662 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.8776296829999999 podCreationTimestamp="2024-02-12 19:47:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:40.857248051 +0000 UTC m=+1.137515662" watchObservedRunningTime="2024-02-12 19:47:40.877629683 +0000 UTC m=+1.157897294" Feb 12 19:47:41.819985 kubelet[2003]: E0212 19:47:41.819949 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:41.820525 kubelet[2003]: E0212 19:47:41.820432 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:42.880000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:42.880000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e75e80 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:42.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:42.881000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:42.881000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e75ec0 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:42.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:42.881000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:42.881000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af4fc0 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:42.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:42.882000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:42.882000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012d7020 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:42.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:44.337646 sudo[1248]: pam_unix(sudo:session): session closed for user root Feb 12 19:47:44.336000 audit[1248]: USER_END pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:44.336000 audit[1248]: CRED_DISP pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:44.339151 sshd[1244]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:44.339000 audit[1244]: USER_END pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:44.339000 audit[1244]: CRED_DISP pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:47:44.341516 systemd[1]: sshd@6-10.0.0.138:22-10.0.0.1:45344.service: Deactivated successfully. Feb 12 19:47:44.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.138:22-10.0.0.1:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:44.342203 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:47:44.342337 systemd[1]: session-7.scope: Consumed 3.432s CPU time. Feb 12 19:47:44.342685 systemd-logind[1110]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:47:44.343295 systemd-logind[1110]: Removed session 7. Feb 12 19:47:47.222107 kubelet[2003]: E0212 19:47:47.222074 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:47.826829 kubelet[2003]: E0212 19:47:47.826811 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:48.828688 kubelet[2003]: E0212 19:47:48.828644 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:49.830588 kubelet[2003]: E0212 19:47:49.830551 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:50.133869 update_engine[1113]: I0212 19:47:50.133827 1113 update_attempter.cc:509] Updating boot flags... Feb 12 19:47:50.831116 kubelet[2003]: E0212 19:47:50.831087 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:51.099564 kubelet[2003]: E0212 19:47:51.099456 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:54.260000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=6324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:47:54.261905 kernel: kauditd_printk_skb: 267 callbacks suppressed Feb 12 19:47:54.262071 kernel: audit: type=1400 audit(1707767274.260:943): avc: denied { watch } for pid=1858 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=6324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:47:54.260000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014423c0 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:54.267780 kernel: audit: type=1300 audit(1707767274.260:943): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014423c0 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:47:54.267844 kernel: audit: type=1327 audit(1707767274.260:943): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:54.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:54.524885 kubelet[2003]: I0212 19:47:54.524757 2003 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:47:54.525243 kubelet[2003]: I0212 19:47:54.525196 2003 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:47:54.525283 env[1123]: time="2024-02-12T19:47:54.525034026Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:47:54.620841 kubelet[2003]: I0212 19:47:54.620794 2003 topology_manager.go:215] "Topology Admit Handler" podUID="1ba8c101-7f6c-4ed9-9e23-0d097126fab6" podNamespace="kube-system" podName="kube-proxy-rvbpx" Feb 12 19:47:54.627437 systemd[1]: Created slice kubepods-besteffort-pod1ba8c101_7f6c_4ed9_9e23_0d097126fab6.slice. Feb 12 19:47:54.657705 kubelet[2003]: I0212 19:47:54.657656 2003 topology_manager.go:215] "Topology Admit Handler" podUID="3db40075-5870-4ad3-8103-9cfdf70ceb81" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-nlw75" Feb 12 19:47:54.661949 systemd[1]: Created slice kubepods-besteffort-pod3db40075_5870_4ad3_8103_9cfdf70ceb81.slice. Feb 12 19:47:54.666725 kubelet[2003]: I0212 19:47:54.666698 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3db40075-5870-4ad3-8103-9cfdf70ceb81-var-lib-calico\") pod \"tigera-operator-55585899bf-nlw75\" (UID: \"3db40075-5870-4ad3-8103-9cfdf70ceb81\") " pod="tigera-operator/tigera-operator-55585899bf-nlw75" Feb 12 19:47:54.666725 kubelet[2003]: I0212 19:47:54.666730 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6p44\" (UniqueName: \"kubernetes.io/projected/3db40075-5870-4ad3-8103-9cfdf70ceb81-kube-api-access-z6p44\") pod \"tigera-operator-55585899bf-nlw75\" (UID: \"3db40075-5870-4ad3-8103-9cfdf70ceb81\") " pod="tigera-operator/tigera-operator-55585899bf-nlw75" Feb 12 19:47:54.666871 kubelet[2003]: I0212 19:47:54.666748 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1ba8c101-7f6c-4ed9-9e23-0d097126fab6-kube-proxy\") pod \"kube-proxy-rvbpx\" (UID: \"1ba8c101-7f6c-4ed9-9e23-0d097126fab6\") " pod="kube-system/kube-proxy-rvbpx" Feb 12 19:47:54.666871 kubelet[2003]: I0212 19:47:54.666774 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1ba8c101-7f6c-4ed9-9e23-0d097126fab6-xtables-lock\") pod \"kube-proxy-rvbpx\" (UID: \"1ba8c101-7f6c-4ed9-9e23-0d097126fab6\") " pod="kube-system/kube-proxy-rvbpx" Feb 12 19:47:54.666871 kubelet[2003]: I0212 19:47:54.666792 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1ba8c101-7f6c-4ed9-9e23-0d097126fab6-lib-modules\") pod \"kube-proxy-rvbpx\" (UID: \"1ba8c101-7f6c-4ed9-9e23-0d097126fab6\") " pod="kube-system/kube-proxy-rvbpx" Feb 12 19:47:54.666871 kubelet[2003]: I0212 19:47:54.666819 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xnhp7\" (UniqueName: \"kubernetes.io/projected/1ba8c101-7f6c-4ed9-9e23-0d097126fab6-kube-api-access-xnhp7\") pod \"kube-proxy-rvbpx\" (UID: \"1ba8c101-7f6c-4ed9-9e23-0d097126fab6\") " pod="kube-system/kube-proxy-rvbpx" Feb 12 19:47:54.935874 kubelet[2003]: E0212 19:47:54.935852 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:54.936260 env[1123]: time="2024-02-12T19:47:54.936218960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rvbpx,Uid:1ba8c101-7f6c-4ed9-9e23-0d097126fab6,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:54.948557 env[1123]: time="2024-02-12T19:47:54.948489529Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:54.948557 env[1123]: time="2024-02-12T19:47:54.948529217Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:54.948557 env[1123]: time="2024-02-12T19:47:54.948539629Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:54.948741 env[1123]: time="2024-02-12T19:47:54.948691331Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1816d09fb8b1c87f0208902e8d69061e0143e0811ae6e8e57ae0616391a604ae pid=2111 runtime=io.containerd.runc.v2 Feb 12 19:47:54.957998 systemd[1]: Started cri-containerd-1816d09fb8b1c87f0208902e8d69061e0143e0811ae6e8e57ae0616391a604ae.scope. Feb 12 19:47:54.964501 env[1123]: time="2024-02-12T19:47:54.964461521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-nlw75,Uid:3db40075-5870-4ad3-8103-9cfdf70ceb81,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:47:54.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.975789 kernel: audit: type=1400 audit(1707767274.965:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.975861 kernel: audit: type=1400 audit(1707767274.965:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.975878 kernel: audit: type=1400 audit(1707767274.967:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.975896 kernel: audit: type=1400 audit(1707767274.967:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.975913 kernel: audit: type=1400 audit(1707767274.967:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978991 kernel: audit: type=1400 audit(1707767274.967:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.979073 kernel: audit: type=1400 audit(1707767274.967:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit: BPF prog-id=106 op=LOAD Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2111 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:54.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313664303966623862316338376630323038393032653864363930 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2111 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:54.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313664303966623862316338376630323038393032653864363930 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.968000 audit: BPF prog-id=107 op=LOAD Feb 12 19:47:54.968000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000203c30 items=0 ppid=2111 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:54.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313664303966623862316338376630323038393032653864363930 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.974000 audit: BPF prog-id=108 op=LOAD Feb 12 19:47:54.974000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000203c78 items=0 ppid=2111 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:54.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313664303966623862316338376630323038393032653864363930 Feb 12 19:47:54.978000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:47:54.978000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:54.978000 audit: BPF prog-id=109 op=LOAD Feb 12 19:47:54.978000 audit[2120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000406088 items=0 ppid=2111 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:54.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313664303966623862316338376630323038393032653864363930 Feb 12 19:47:54.988609 env[1123]: time="2024-02-12T19:47:54.988538035Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:54.988609 env[1123]: time="2024-02-12T19:47:54.988577591Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:54.988609 env[1123]: time="2024-02-12T19:47:54.988605212Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:54.988896 env[1123]: time="2024-02-12T19:47:54.988809908Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6aaad78d502cd404eca36de2d24e4df71b298fdd33871be6e205bca98152a6d pid=2150 runtime=io.containerd.runc.v2 Feb 12 19:47:54.990061 env[1123]: time="2024-02-12T19:47:54.990029666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rvbpx,Uid:1ba8c101-7f6c-4ed9-9e23-0d097126fab6,Namespace:kube-system,Attempt:0,} returns sandbox id \"1816d09fb8b1c87f0208902e8d69061e0143e0811ae6e8e57ae0616391a604ae\"" Feb 12 19:47:54.991263 kubelet[2003]: E0212 19:47:54.990897 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:54.992580 env[1123]: time="2024-02-12T19:47:54.992556772Z" level=info msg="CreateContainer within sandbox \"1816d09fb8b1c87f0208902e8d69061e0143e0811ae6e8e57ae0616391a604ae\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:47:54.998425 systemd[1]: Started cri-containerd-c6aaad78d502cd404eca36de2d24e4df71b298fdd33871be6e205bca98152a6d.scope. Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit: BPF prog-id=110 op=LOAD Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2150 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616161643738643530326364343034656361333664653264323465 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2150 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616161643738643530326364343034656361333664653264323465 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit: BPF prog-id=111 op=LOAD Feb 12 19:47:55.008000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00039f1c0 items=0 ppid=2150 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616161643738643530326364343034656361333664653264323465 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit: BPF prog-id=112 op=LOAD Feb 12 19:47:55.008000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00039f208 items=0 ppid=2150 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616161643738643530326364343034656361333664653264323465 Feb 12 19:47:55.008000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:47:55.008000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.008000 audit: BPF prog-id=113 op=LOAD Feb 12 19:47:55.008000 audit[2160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00039f618 items=0 ppid=2150 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336616161643738643530326364343034656361333664653264323465 Feb 12 19:47:55.021299 env[1123]: time="2024-02-12T19:47:55.021268287Z" level=info msg="CreateContainer within sandbox \"1816d09fb8b1c87f0208902e8d69061e0143e0811ae6e8e57ae0616391a604ae\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4d77ad8413f0f597fc7fb6e410cc467842899e7636c89b48adeaa4cd063e66e9\"" Feb 12 19:47:55.022064 env[1123]: time="2024-02-12T19:47:55.022045466Z" level=info msg="StartContainer for \"4d77ad8413f0f597fc7fb6e410cc467842899e7636c89b48adeaa4cd063e66e9\"" Feb 12 19:47:55.032005 env[1123]: time="2024-02-12T19:47:55.031969294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-nlw75,Uid:3db40075-5870-4ad3-8103-9cfdf70ceb81,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c6aaad78d502cd404eca36de2d24e4df71b298fdd33871be6e205bca98152a6d\"" Feb 12 19:47:55.033494 env[1123]: time="2024-02-12T19:47:55.033473752Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:47:55.037281 systemd[1]: Started cri-containerd-4d77ad8413f0f597fc7fb6e410cc467842899e7636c89b48adeaa4cd063e66e9.scope. Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8b245daac8 items=0 ppid=2111 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373761643834313366306635393766633766623665343130636334 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit: BPF prog-id=114 op=LOAD Feb 12 19:47:55.048000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034dba8 items=0 ppid=2111 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373761643834313366306635393766633766623665343130636334 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit: BPF prog-id=115 op=LOAD Feb 12 19:47:55.048000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034dbf8 items=0 ppid=2111 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373761643834313366306635393766633766623665343130636334 Feb 12 19:47:55.048000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:47:55.048000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:55.048000 audit: BPF prog-id=116 op=LOAD Feb 12 19:47:55.048000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034dc88 items=0 ppid=2111 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373761643834313366306635393766633766623665343130636334 Feb 12 19:47:55.060148 env[1123]: time="2024-02-12T19:47:55.060116468Z" level=info msg="StartContainer for \"4d77ad8413f0f597fc7fb6e410cc467842899e7636c89b48adeaa4cd063e66e9\" returns successfully" Feb 12 19:47:55.107000 audit[2245]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.107000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcba2b4850 a2=0 a3=7ffcba2b483c items=0 ppid=2204 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:47:55.108000 audit[2246]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.108000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0545eac0 a2=0 a3=7ffc0545eaac items=0 ppid=2204 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:47:55.109000 audit[2247]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.109000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff24bca8d0 a2=0 a3=7fff24bca8bc items=0 ppid=2204 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:47:55.111000 audit[2248]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.111000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea3f48f00 a2=0 a3=7ffea3f48eec items=0 ppid=2204 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:47:55.111000 audit[2249]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.111000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefd5f1300 a2=0 a3=7ffefd5f12ec items=0 ppid=2204 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:47:55.112000 audit[2250]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.112000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc641fc0a0 a2=0 a3=7ffc641fc08c items=0 ppid=2204 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:47:55.210000 audit[2251]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.210000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc4b83dfa0 a2=0 a3=7ffc4b83df8c items=0 ppid=2204 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:47:55.212000 audit[2253]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.212000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff1cf4eb50 a2=0 a3=7fff1cf4eb3c items=0 ppid=2204 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:47:55.216000 audit[2256]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.216000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdf44168f0 a2=0 a3=7ffdf44168dc items=0 ppid=2204 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:47:55.216000 audit[2257]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.216000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7662bd00 a2=0 a3=7ffe7662bcec items=0 ppid=2204 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:47:55.218000 audit[2259]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.218000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf77e2970 a2=0 a3=7ffdf77e295c items=0 ppid=2204 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:47:55.219000 audit[2260]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.219000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc0c3f3c0 a2=0 a3=7fffc0c3f3ac items=0 ppid=2204 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:47:55.221000 audit[2262]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.221000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcf36ba00 a2=0 a3=7fffcf36b9ec items=0 ppid=2204 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:47:55.223000 audit[2265]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.223000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd780986d0 a2=0 a3=7ffd780986bc items=0 ppid=2204 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:47:55.224000 audit[2266]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.224000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7c364e40 a2=0 a3=7ffd7c364e2c items=0 ppid=2204 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:47:55.226000 audit[2268]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.226000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe339f2770 a2=0 a3=7ffe339f275c items=0 ppid=2204 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:47:55.227000 audit[2269]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.227000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5f62da00 a2=0 a3=7fff5f62d9ec items=0 ppid=2204 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:47:55.228000 audit[2271]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.228000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe10522680 a2=0 a3=7ffe1052266c items=0 ppid=2204 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:47:55.231000 audit[2274]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.231000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc781505a0 a2=0 a3=7ffc7815058c items=0 ppid=2204 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:47:55.234000 audit[2277]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.234000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc0c5eba0 a2=0 a3=7ffcc0c5eb8c items=0 ppid=2204 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:47:55.234000 audit[2278]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.234000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcafb873f0 a2=0 a3=7ffcafb873dc items=0 ppid=2204 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:47:55.236000 audit[2280]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.236000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc4fcb63f0 a2=0 a3=7ffc4fcb63dc items=0 ppid=2204 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:55.239000 audit[2283]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.239000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccf7aa7e0 a2=0 a3=7ffccf7aa7cc items=0 ppid=2204 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:55.239000 audit[2284]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.239000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcce182000 a2=0 a3=7ffcce181fec items=0 ppid=2204 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:47:55.241000 audit[2286]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:55.241000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc42e845f0 a2=0 a3=7ffc42e845dc items=0 ppid=2204 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:47:55.252000 audit[2292]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:55.252000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffeb7fcd8d0 a2=0 a3=7ffeb7fcd8bc items=0 ppid=2204 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:55.264000 audit[2292]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:55.264000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffeb7fcd8d0 a2=0 a3=7ffeb7fcd8bc items=0 ppid=2204 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:55.265000 audit[2298]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.265000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda47a4fb0 a2=0 a3=7ffda47a4f9c items=0 ppid=2204 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:47:55.267000 audit[2300]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.267000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc2d8b4dc0 a2=0 a3=7ffc2d8b4dac items=0 ppid=2204 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:47:55.270000 audit[2303]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.270000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe496fb8f0 a2=0 a3=7ffe496fb8dc items=0 ppid=2204 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:47:55.271000 audit[2304]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.271000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee0d6fc10 a2=0 a3=7ffee0d6fbfc items=0 ppid=2204 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:47:55.272000 audit[2306]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.272000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc9b57b80 a2=0 a3=7ffcc9b57b6c items=0 ppid=2204 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:47:55.273000 audit[2307]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.273000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8011ce60 a2=0 a3=7ffe8011ce4c items=0 ppid=2204 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:47:55.275000 audit[2309]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.275000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcdd21aa50 a2=0 a3=7ffcdd21aa3c items=0 ppid=2204 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:47:55.278000 audit[2312]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.278000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdae46c630 a2=0 a3=7ffdae46c61c items=0 ppid=2204 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:47:55.278000 audit[2313]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.278000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff80eefec0 a2=0 a3=7fff80eefeac items=0 ppid=2204 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:47:55.280000 audit[2315]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.280000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd74b05cd0 a2=0 a3=7ffd74b05cbc items=0 ppid=2204 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:47:55.281000 audit[2316]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.281000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd5321e20 a2=0 a3=7ffdd5321e0c items=0 ppid=2204 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:47:55.283000 audit[2318]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.283000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff29f66850 a2=0 a3=7fff29f6683c items=0 ppid=2204 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:47:55.286000 audit[2321]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.286000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcea501450 a2=0 a3=7ffcea50143c items=0 ppid=2204 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:47:55.288000 audit[2324]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.288000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3082cc90 a2=0 a3=7ffe3082cc7c items=0 ppid=2204 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:47:55.289000 audit[2325]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.289000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec985f780 a2=0 a3=7ffec985f76c items=0 ppid=2204 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:47:55.291000 audit[2327]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.291000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9c844590 a2=0 a3=7ffc9c84457c items=0 ppid=2204 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:55.293000 audit[2330]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.293000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc2d73e360 a2=0 a3=7ffc2d73e34c items=0 ppid=2204 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:55.294000 audit[2331]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.294000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2852cb90 a2=0 a3=7ffe2852cb7c items=0 ppid=2204 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:47:55.295000 audit[2333]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.295000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd38229a10 a2=0 a3=7ffd382299fc items=0 ppid=2204 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:47:55.296000 audit[2334]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.296000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5f69d8f0 a2=0 a3=7ffe5f69d8dc items=0 ppid=2204 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:47:55.298000 audit[2336]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.298000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd89519e50 a2=0 a3=7ffd89519e3c items=0 ppid=2204 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:47:55.300000 audit[2339]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:55.300000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff491de810 a2=0 a3=7fff491de7fc items=0 ppid=2204 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:47:55.302000 audit[2341]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:47:55.302000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffc93e0b90 a2=0 a3=7fffc93e0b7c items=0 ppid=2204 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.302000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:55.303000 audit[2341]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:47:55.303000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fffc93e0b90 a2=0 a3=7fffc93e0b7c items=0 ppid=2204 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.303000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:55.838737 kubelet[2003]: E0212 19:47:55.838707 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:47:55.845065 kubelet[2003]: I0212 19:47:55.845032 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-rvbpx" podStartSLOduration=1.8449804570000001 podCreationTimestamp="2024-02-12 19:47:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:55.844754256 +0000 UTC m=+16.125021888" watchObservedRunningTime="2024-02-12 19:47:55.844980457 +0000 UTC m=+16.125248069" Feb 12 19:47:58.243325 env[1123]: time="2024-02-12T19:47:58.243279861Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:58.244879 env[1123]: time="2024-02-12T19:47:58.244831123Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:58.246203 env[1123]: time="2024-02-12T19:47:58.246176656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:58.247480 env[1123]: time="2024-02-12T19:47:58.247458572Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:58.248161 env[1123]: time="2024-02-12T19:47:58.248131509Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 19:47:58.249511 env[1123]: time="2024-02-12T19:47:58.249484748Z" level=info msg="CreateContainer within sandbox \"c6aaad78d502cd404eca36de2d24e4df71b298fdd33871be6e205bca98152a6d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:47:58.259209 env[1123]: time="2024-02-12T19:47:58.259171389Z" level=info msg="CreateContainer within sandbox \"c6aaad78d502cd404eca36de2d24e4df71b298fdd33871be6e205bca98152a6d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"8b909d5d98918324dff0c45b03f75e1d031eaf19729bdb1fb4890a77e25da7e0\"" Feb 12 19:47:58.259824 env[1123]: time="2024-02-12T19:47:58.259728458Z" level=info msg="StartContainer for \"8b909d5d98918324dff0c45b03f75e1d031eaf19729bdb1fb4890a77e25da7e0\"" Feb 12 19:47:58.275229 systemd[1]: Started cri-containerd-8b909d5d98918324dff0c45b03f75e1d031eaf19729bdb1fb4890a77e25da7e0.scope. Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.289000 audit: BPF prog-id=117 op=LOAD Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2150 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393039643564393839313833323464666630633435623033663735 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2150 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393039643564393839313833323464666630633435623033663735 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit: BPF prog-id=118 op=LOAD Feb 12 19:47:58.290000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c61c0 items=0 ppid=2150 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393039643564393839313833323464666630633435623033663735 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit: BPF prog-id=119 op=LOAD Feb 12 19:47:58.290000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6208 items=0 ppid=2150 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393039643564393839313833323464666630633435623033663735 Feb 12 19:47:58.290000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:47:58.290000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.290000 audit: BPF prog-id=120 op=LOAD Feb 12 19:47:58.290000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c6618 items=0 ppid=2150 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393039643564393839313833323464666630633435623033663735 Feb 12 19:47:58.302609 env[1123]: time="2024-02-12T19:47:58.302572687Z" level=info msg="StartContainer for \"8b909d5d98918324dff0c45b03f75e1d031eaf19729bdb1fb4890a77e25da7e0\" returns successfully" Feb 12 19:47:58.851040 kubelet[2003]: I0212 19:47:58.850688 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-nlw75" podStartSLOduration=1.635326888 podCreationTimestamp="2024-02-12 19:47:54 +0000 UTC" firstStartedPulling="2024-02-12 19:47:55.033035661 +0000 UTC m=+15.313303272" lastFinishedPulling="2024-02-12 19:47:58.248351729 +0000 UTC m=+18.528619340" observedRunningTime="2024-02-12 19:47:58.850627483 +0000 UTC m=+19.130895094" watchObservedRunningTime="2024-02-12 19:47:58.850642956 +0000 UTC m=+19.130910567" Feb 12 19:48:00.022000 audit[2385]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.023858 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 12 19:48:00.024018 kernel: audit: type=1325 audit(1707767280.022:1055): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.022000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc6c814da0 a2=0 a3=7ffc6c814d8c items=0 ppid=2204 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.028470 kernel: audit: type=1300 audit(1707767280.022:1055): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc6c814da0 a2=0 a3=7ffc6c814d8c items=0 ppid=2204 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.028512 kernel: audit: type=1327 audit(1707767280.022:1055): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.022000 audit[2385]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.022000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6c814da0 a2=0 a3=31030 items=0 ppid=2204 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.037450 kernel: audit: type=1325 audit(1707767280.022:1056): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.037491 kernel: audit: type=1300 audit(1707767280.022:1056): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6c814da0 a2=0 a3=31030 items=0 ppid=2204 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.037513 kernel: audit: type=1327 audit(1707767280.022:1056): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.035000 audit[2387]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.035000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fffab22ad50 a2=0 a3=7fffab22ad3c items=0 ppid=2204 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.047521 kernel: audit: type=1325 audit(1707767280.035:1057): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.047579 kernel: audit: type=1300 audit(1707767280.035:1057): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fffab22ad50 a2=0 a3=7fffab22ad3c items=0 ppid=2204 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.047606 kernel: audit: type=1327 audit(1707767280.035:1057): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.042000 audit[2387]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.042000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fffab22ad50 a2=0 a3=31030 items=0 ppid=2204 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:00.052786 kernel: audit: type=1325 audit(1707767280.042:1058): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:00.140632 kubelet[2003]: I0212 19:48:00.140602 2003 topology_manager.go:215] "Topology Admit Handler" podUID="4b087fbb-1497-4cd3-992b-37fd1670da6c" podNamespace="calico-system" podName="calico-typha-688f5dc955-b558j" Feb 12 19:48:00.146711 systemd[1]: Created slice kubepods-besteffort-pod4b087fbb_1497_4cd3_992b_37fd1670da6c.slice. Feb 12 19:48:00.176962 kubelet[2003]: I0212 19:48:00.176923 2003 topology_manager.go:215] "Topology Admit Handler" podUID="35bfc48c-93fd-44e5-ad23-ada4b01891e5" podNamespace="calico-system" podName="calico-node-bsdq2" Feb 12 19:48:00.181583 systemd[1]: Created slice kubepods-besteffort-pod35bfc48c_93fd_44e5_ad23_ada4b01891e5.slice. Feb 12 19:48:00.199439 kubelet[2003]: I0212 19:48:00.199410 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-cni-bin-dir\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199535 kubelet[2003]: I0212 19:48:00.199446 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/35bfc48c-93fd-44e5-ad23-ada4b01891e5-node-certs\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199535 kubelet[2003]: I0212 19:48:00.199470 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4b087fbb-1497-4cd3-992b-37fd1670da6c-tigera-ca-bundle\") pod \"calico-typha-688f5dc955-b558j\" (UID: \"4b087fbb-1497-4cd3-992b-37fd1670da6c\") " pod="calico-system/calico-typha-688f5dc955-b558j" Feb 12 19:48:00.199535 kubelet[2003]: I0212 19:48:00.199488 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-policysync\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199535 kubelet[2003]: I0212 19:48:00.199508 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-cni-log-dir\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199535 kubelet[2003]: I0212 19:48:00.199527 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jqwbq\" (UniqueName: \"kubernetes.io/projected/35bfc48c-93fd-44e5-ad23-ada4b01891e5-kube-api-access-jqwbq\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199656 kubelet[2003]: I0212 19:48:00.199544 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-var-lib-calico\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199656 kubelet[2003]: I0212 19:48:00.199563 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-lib-modules\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199656 kubelet[2003]: I0212 19:48:00.199582 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-xtables-lock\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199656 kubelet[2003]: I0212 19:48:00.199599 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/35bfc48c-93fd-44e5-ad23-ada4b01891e5-tigera-ca-bundle\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199656 kubelet[2003]: I0212 19:48:00.199617 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-var-run-calico\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199785 kubelet[2003]: I0212 19:48:00.199637 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-flexvol-driver-host\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199785 kubelet[2003]: I0212 19:48:00.199656 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/35bfc48c-93fd-44e5-ad23-ada4b01891e5-cni-net-dir\") pod \"calico-node-bsdq2\" (UID: \"35bfc48c-93fd-44e5-ad23-ada4b01891e5\") " pod="calico-system/calico-node-bsdq2" Feb 12 19:48:00.199785 kubelet[2003]: I0212 19:48:00.199678 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-brt7j\" (UniqueName: \"kubernetes.io/projected/4b087fbb-1497-4cd3-992b-37fd1670da6c-kube-api-access-brt7j\") pod \"calico-typha-688f5dc955-b558j\" (UID: \"4b087fbb-1497-4cd3-992b-37fd1670da6c\") " pod="calico-system/calico-typha-688f5dc955-b558j" Feb 12 19:48:00.199785 kubelet[2003]: I0212 19:48:00.199702 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4b087fbb-1497-4cd3-992b-37fd1670da6c-typha-certs\") pod \"calico-typha-688f5dc955-b558j\" (UID: \"4b087fbb-1497-4cd3-992b-37fd1670da6c\") " pod="calico-system/calico-typha-688f5dc955-b558j" Feb 12 19:48:00.286094 kubelet[2003]: I0212 19:48:00.285982 2003 topology_manager.go:215] "Topology Admit Handler" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" podNamespace="calico-system" podName="csi-node-driver-nvkq8" Feb 12 19:48:00.287087 kubelet[2003]: E0212 19:48:00.286239 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:00.300026 kubelet[2003]: I0212 19:48:00.299988 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/902e07e6-2c2f-4c9d-9de4-300d08b5a396-registration-dir\") pod \"csi-node-driver-nvkq8\" (UID: \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\") " pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:00.300026 kubelet[2003]: I0212 19:48:00.300028 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jlgrm\" (UniqueName: \"kubernetes.io/projected/902e07e6-2c2f-4c9d-9de4-300d08b5a396-kube-api-access-jlgrm\") pod \"csi-node-driver-nvkq8\" (UID: \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\") " pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:00.300150 kubelet[2003]: I0212 19:48:00.300069 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/902e07e6-2c2f-4c9d-9de4-300d08b5a396-socket-dir\") pod \"csi-node-driver-nvkq8\" (UID: \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\") " pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:00.300150 kubelet[2003]: I0212 19:48:00.300096 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/902e07e6-2c2f-4c9d-9de4-300d08b5a396-kubelet-dir\") pod \"csi-node-driver-nvkq8\" (UID: \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\") " pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:00.300150 kubelet[2003]: I0212 19:48:00.300143 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/902e07e6-2c2f-4c9d-9de4-300d08b5a396-varrun\") pod \"csi-node-driver-nvkq8\" (UID: \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\") " pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:00.301942 kubelet[2003]: E0212 19:48:00.301902 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.301942 kubelet[2003]: W0212 19:48:00.301940 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.302023 kubelet[2003]: E0212 19:48:00.301967 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.304126 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.305967 kubelet[2003]: W0212 19:48:00.304138 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.304150 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.304834 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.305967 kubelet[2003]: W0212 19:48:00.304841 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.304914 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.304994 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.305967 kubelet[2003]: W0212 19:48:00.304999 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.305053 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.305967 kubelet[2003]: E0212 19:48:00.305122 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306214 kubelet[2003]: W0212 19:48:00.305128 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306214 kubelet[2003]: E0212 19:48:00.305182 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.306214 kubelet[2003]: E0212 19:48:00.305260 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306214 kubelet[2003]: W0212 19:48:00.305275 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306214 kubelet[2003]: E0212 19:48:00.305320 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.306214 kubelet[2003]: E0212 19:48:00.305387 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306214 kubelet[2003]: W0212 19:48:00.305392 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306214 kubelet[2003]: E0212 19:48:00.305442 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.306214 kubelet[2003]: E0212 19:48:00.305523 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306214 kubelet[2003]: W0212 19:48:00.305528 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305543 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305670 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306428 kubelet[2003]: W0212 19:48:00.305675 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305693 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305811 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306428 kubelet[2003]: W0212 19:48:00.305816 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305824 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305960 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.306428 kubelet[2003]: W0212 19:48:00.305966 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.306428 kubelet[2003]: E0212 19:48:00.305974 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.307001 kubelet[2003]: E0212 19:48:00.306971 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.307001 kubelet[2003]: W0212 19:48:00.306994 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.307077 kubelet[2003]: E0212 19:48:00.307020 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.312680 kubelet[2003]: E0212 19:48:00.312658 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.312680 kubelet[2003]: W0212 19:48:00.312673 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.312747 kubelet[2003]: E0212 19:48:00.312685 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.312948 kubelet[2003]: E0212 19:48:00.312925 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.312948 kubelet[2003]: W0212 19:48:00.312940 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.313024 kubelet[2003]: E0212 19:48:00.312953 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.314253 kubelet[2003]: E0212 19:48:00.314224 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.314253 kubelet[2003]: W0212 19:48:00.314246 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.314318 kubelet[2003]: E0212 19:48:00.314259 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.316889 kubelet[2003]: E0212 19:48:00.316876 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.316969 kubelet[2003]: W0212 19:48:00.316951 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.317052 kubelet[2003]: E0212 19:48:00.317037 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.320364 kubelet[2003]: E0212 19:48:00.320331 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.320364 kubelet[2003]: W0212 19:48:00.320350 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.320364 kubelet[2003]: E0212 19:48:00.320370 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.401278 kubelet[2003]: E0212 19:48:00.401240 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.401278 kubelet[2003]: W0212 19:48:00.401267 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.401278 kubelet[2003]: E0212 19:48:00.401287 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.401606 kubelet[2003]: E0212 19:48:00.401591 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.401649 kubelet[2003]: W0212 19:48:00.401618 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.401649 kubelet[2003]: E0212 19:48:00.401636 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.401844 kubelet[2003]: E0212 19:48:00.401830 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.401844 kubelet[2003]: W0212 19:48:00.401841 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.401918 kubelet[2003]: E0212 19:48:00.401856 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.402147 kubelet[2003]: E0212 19:48:00.402115 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.402147 kubelet[2003]: W0212 19:48:00.402137 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.402337 kubelet[2003]: E0212 19:48:00.402164 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.402440 kubelet[2003]: E0212 19:48:00.402423 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.402440 kubelet[2003]: W0212 19:48:00.402431 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.402517 kubelet[2003]: E0212 19:48:00.402444 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.402655 kubelet[2003]: E0212 19:48:00.402618 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.402655 kubelet[2003]: W0212 19:48:00.402632 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.402852 kubelet[2003]: E0212 19:48:00.402709 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.402852 kubelet[2003]: E0212 19:48:00.402809 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.402852 kubelet[2003]: W0212 19:48:00.402815 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.402925 kubelet[2003]: E0212 19:48:00.402868 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.402998 kubelet[2003]: E0212 19:48:00.402984 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.402998 kubelet[2003]: W0212 19:48:00.402996 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.403073 kubelet[2003]: E0212 19:48:00.403063 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.403152 kubelet[2003]: E0212 19:48:00.403139 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.403152 kubelet[2003]: W0212 19:48:00.403146 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.403271 kubelet[2003]: E0212 19:48:00.403158 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.403345 kubelet[2003]: E0212 19:48:00.403328 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.403345 kubelet[2003]: W0212 19:48:00.403338 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.403570 kubelet[2003]: E0212 19:48:00.403353 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.403570 kubelet[2003]: E0212 19:48:00.403514 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.403570 kubelet[2003]: W0212 19:48:00.403519 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.403570 kubelet[2003]: E0212 19:48:00.403556 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.403702 kubelet[2003]: E0212 19:48:00.403685 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.403702 kubelet[2003]: W0212 19:48:00.403698 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.403835 kubelet[2003]: E0212 19:48:00.403820 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.403906 kubelet[2003]: E0212 19:48:00.403895 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.403906 kubelet[2003]: W0212 19:48:00.403904 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.403959 kubelet[2003]: E0212 19:48:00.403916 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.404095 kubelet[2003]: E0212 19:48:00.404078 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.404095 kubelet[2003]: W0212 19:48:00.404091 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.404178 kubelet[2003]: E0212 19:48:00.404165 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.404279 kubelet[2003]: E0212 19:48:00.404266 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.404305 kubelet[2003]: W0212 19:48:00.404291 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.404386 kubelet[2003]: E0212 19:48:00.404368 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.404500 kubelet[2003]: E0212 19:48:00.404485 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.404500 kubelet[2003]: W0212 19:48:00.404496 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.404607 kubelet[2003]: E0212 19:48:00.404584 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.404688 kubelet[2003]: E0212 19:48:00.404672 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.404714 kubelet[2003]: W0212 19:48:00.404692 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.404714 kubelet[2003]: E0212 19:48:00.404706 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.405051 kubelet[2003]: E0212 19:48:00.405037 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.405051 kubelet[2003]: W0212 19:48:00.405050 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.405125 kubelet[2003]: E0212 19:48:00.405063 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.405190 kubelet[2003]: E0212 19:48:00.405176 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.405190 kubelet[2003]: W0212 19:48:00.405186 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.405239 kubelet[2003]: E0212 19:48:00.405194 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.405428 kubelet[2003]: E0212 19:48:00.405411 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.405428 kubelet[2003]: W0212 19:48:00.405424 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.405522 kubelet[2003]: E0212 19:48:00.405438 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.405667 kubelet[2003]: E0212 19:48:00.405642 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.405667 kubelet[2003]: W0212 19:48:00.405658 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.405740 kubelet[2003]: E0212 19:48:00.405685 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.405866 kubelet[2003]: E0212 19:48:00.405837 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.405866 kubelet[2003]: W0212 19:48:00.405859 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.405955 kubelet[2003]: E0212 19:48:00.405884 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.406036 kubelet[2003]: E0212 19:48:00.406021 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.406036 kubelet[2003]: W0212 19:48:00.406032 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.406087 kubelet[2003]: E0212 19:48:00.406052 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.406246 kubelet[2003]: E0212 19:48:00.406233 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.406246 kubelet[2003]: W0212 19:48:00.406244 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.406304 kubelet[2003]: E0212 19:48:00.406264 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.406457 kubelet[2003]: E0212 19:48:00.406444 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.406457 kubelet[2003]: W0212 19:48:00.406455 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.406510 kubelet[2003]: E0212 19:48:00.406465 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.412977 kubelet[2003]: E0212 19:48:00.412961 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:00.412977 kubelet[2003]: W0212 19:48:00.412973 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:00.413062 kubelet[2003]: E0212 19:48:00.412987 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:00.450516 kubelet[2003]: E0212 19:48:00.450486 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:00.451169 env[1123]: time="2024-02-12T19:48:00.451123546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-688f5dc955-b558j,Uid:4b087fbb-1497-4cd3-992b-37fd1670da6c,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:00.465441 env[1123]: time="2024-02-12T19:48:00.465369729Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:00.465441 env[1123]: time="2024-02-12T19:48:00.465408350Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:00.465441 env[1123]: time="2024-02-12T19:48:00.465418251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:00.465745 env[1123]: time="2024-02-12T19:48:00.465700829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3cc2c29e3ace95a49b704619c804628a4056eb806b30d6dea60862c7ac38296f pid=2444 runtime=io.containerd.runc.v2 Feb 12 19:48:00.476222 systemd[1]: Started cri-containerd-3cc2c29e3ace95a49b704619c804628a4056eb806b30d6dea60862c7ac38296f.scope. Feb 12 19:48:00.484608 kubelet[2003]: E0212 19:48:00.484578 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:00.485119 env[1123]: time="2024-02-12T19:48:00.485084240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bsdq2,Uid:35bfc48c-93fd-44e5-ad23-ada4b01891e5,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.485000 audit: BPF prog-id=121 op=LOAD Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2444 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633263323965336163653935613439623730343631396338303436 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2444 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633263323965336163653935613439623730343631396338303436 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit: BPF prog-id=122 op=LOAD Feb 12 19:48:00.486000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000985e0 items=0 ppid=2444 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633263323965336163653935613439623730343631396338303436 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit: BPF prog-id=123 op=LOAD Feb 12 19:48:00.486000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098628 items=0 ppid=2444 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633263323965336163653935613439623730343631396338303436 Feb 12 19:48:00.486000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:48:00.486000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.486000 audit: BPF prog-id=124 op=LOAD Feb 12 19:48:00.486000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098a38 items=0 ppid=2444 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633263323965336163653935613439623730343631396338303436 Feb 12 19:48:00.500471 env[1123]: time="2024-02-12T19:48:00.500428554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:00.500603 env[1123]: time="2024-02-12T19:48:00.500581337Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:00.500711 env[1123]: time="2024-02-12T19:48:00.500689425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:00.501615 env[1123]: time="2024-02-12T19:48:00.500971261Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f pid=2475 runtime=io.containerd.runc.v2 Feb 12 19:48:00.510346 env[1123]: time="2024-02-12T19:48:00.510295199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-688f5dc955-b558j,Uid:4b087fbb-1497-4cd3-992b-37fd1670da6c,Namespace:calico-system,Attempt:0,} returns sandbox id \"3cc2c29e3ace95a49b704619c804628a4056eb806b30d6dea60862c7ac38296f\"" Feb 12 19:48:00.510951 kubelet[2003]: E0212 19:48:00.510923 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:00.512425 env[1123]: time="2024-02-12T19:48:00.512399737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:48:00.516206 systemd[1]: Started cri-containerd-c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f.scope. Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.527000 audit: BPF prog-id=125 op=LOAD Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337643132366432373230323232633932633966663965653438323439 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337643132366432373230323232633932633966663965653438323439 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit: BPF prog-id=126 op=LOAD Feb 12 19:48:00.528000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b2520 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337643132366432373230323232633932633966663965653438323439 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit: BPF prog-id=127 op=LOAD Feb 12 19:48:00.528000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b2568 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337643132366432373230323232633932633966663965653438323439 Feb 12 19:48:00.528000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:48:00.528000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:00.528000 audit: BPF prog-id=128 op=LOAD Feb 12 19:48:00.528000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b2978 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:00.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337643132366432373230323232633932633966663965653438323439 Feb 12 19:48:00.542044 env[1123]: time="2024-02-12T19:48:00.541953897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bsdq2,Uid:35bfc48c-93fd-44e5-ad23-ada4b01891e5,Namespace:calico-system,Attempt:0,} returns sandbox id \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\"" Feb 12 19:48:00.548000 kubelet[2003]: E0212 19:48:00.547554 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:01.053000 audit[2517]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:01.053000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffdf78f6460 a2=0 a3=7ffdf78f644c items=0 ppid=2204 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:01.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:01.053000 audit[2517]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:01.053000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffdf78f6460 a2=0 a3=31030 items=0 ppid=2204 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:01.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:01.810683 kubelet[2003]: E0212 19:48:01.810641 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:01.963872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3055891762.mount: Deactivated successfully. Feb 12 19:48:03.441496 env[1123]: time="2024-02-12T19:48:03.441447275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:03.443943 env[1123]: time="2024-02-12T19:48:03.443911086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:03.447216 env[1123]: time="2024-02-12T19:48:03.447176119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:03.448676 env[1123]: time="2024-02-12T19:48:03.448652389Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:03.449410 env[1123]: time="2024-02-12T19:48:03.449371190Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 19:48:03.449989 env[1123]: time="2024-02-12T19:48:03.449918772Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:48:03.459247 env[1123]: time="2024-02-12T19:48:03.459205951Z" level=info msg="CreateContainer within sandbox \"3cc2c29e3ace95a49b704619c804628a4056eb806b30d6dea60862c7ac38296f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:48:03.469887 env[1123]: time="2024-02-12T19:48:03.469820350Z" level=info msg="CreateContainer within sandbox \"3cc2c29e3ace95a49b704619c804628a4056eb806b30d6dea60862c7ac38296f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"cc87a7a07ed676dbd375fb455c06a31c7c740da878d23bc6a239a42f80e6e0f0\"" Feb 12 19:48:03.470460 env[1123]: time="2024-02-12T19:48:03.470409589Z" level=info msg="StartContainer for \"cc87a7a07ed676dbd375fb455c06a31c7c740da878d23bc6a239a42f80e6e0f0\"" Feb 12 19:48:03.483176 systemd[1]: Started cri-containerd-cc87a7a07ed676dbd375fb455c06a31c7c740da878d23bc6a239a42f80e6e0f0.scope. Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.493000 audit: BPF prog-id=129 op=LOAD Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2444 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383761376130376564363736646264333735666234353563303661 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2444 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383761376130376564363736646264333735666234353563303661 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit: BPF prog-id=130 op=LOAD Feb 12 19:48:03.494000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030bb30 items=0 ppid=2444 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383761376130376564363736646264333735666234353563303661 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit: BPF prog-id=131 op=LOAD Feb 12 19:48:03.494000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030bb78 items=0 ppid=2444 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383761376130376564363736646264333735666234353563303661 Feb 12 19:48:03.494000 audit: BPF prog-id=131 op=UNLOAD Feb 12 19:48:03.494000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:03.494000 audit: BPF prog-id=132 op=LOAD Feb 12 19:48:03.494000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030bf88 items=0 ppid=2444 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383761376130376564363736646264333735666234353563303661 Feb 12 19:48:03.606388 env[1123]: time="2024-02-12T19:48:03.606343556Z" level=info msg="StartContainer for \"cc87a7a07ed676dbd375fb455c06a31c7c740da878d23bc6a239a42f80e6e0f0\" returns successfully" Feb 12 19:48:03.811532 kubelet[2003]: E0212 19:48:03.811430 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:03.854198 kubelet[2003]: E0212 19:48:03.854179 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:03.861159 kubelet[2003]: I0212 19:48:03.861127 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-688f5dc955-b558j" podStartSLOduration=0.923502808 podCreationTimestamp="2024-02-12 19:48:00 +0000 UTC" firstStartedPulling="2024-02-12 19:48:00.51205538 +0000 UTC m=+20.792322981" lastFinishedPulling="2024-02-12 19:48:03.449640461 +0000 UTC m=+23.729908092" observedRunningTime="2024-02-12 19:48:03.860651488 +0000 UTC m=+24.140919110" watchObservedRunningTime="2024-02-12 19:48:03.861087919 +0000 UTC m=+24.141355530" Feb 12 19:48:03.923203 kubelet[2003]: E0212 19:48:03.923183 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.923203 kubelet[2003]: W0212 19:48:03.923199 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.923300 kubelet[2003]: E0212 19:48:03.923218 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.923461 kubelet[2003]: E0212 19:48:03.923441 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.923461 kubelet[2003]: W0212 19:48:03.923452 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.923512 kubelet[2003]: E0212 19:48:03.923472 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.923619 kubelet[2003]: E0212 19:48:03.923609 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.923619 kubelet[2003]: W0212 19:48:03.923617 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.923673 kubelet[2003]: E0212 19:48:03.923634 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.923788 kubelet[2003]: E0212 19:48:03.923777 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.923788 kubelet[2003]: W0212 19:48:03.923786 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.923846 kubelet[2003]: E0212 19:48:03.923796 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.923960 kubelet[2003]: E0212 19:48:03.923941 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.923960 kubelet[2003]: W0212 19:48:03.923957 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924012 kubelet[2003]: E0212 19:48:03.923965 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.924102 kubelet[2003]: E0212 19:48:03.924088 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.924102 kubelet[2003]: W0212 19:48:03.924096 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924102 kubelet[2003]: E0212 19:48:03.924105 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.924257 kubelet[2003]: E0212 19:48:03.924244 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.924257 kubelet[2003]: W0212 19:48:03.924252 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924257 kubelet[2003]: E0212 19:48:03.924260 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.924439 kubelet[2003]: E0212 19:48:03.924422 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.924439 kubelet[2003]: W0212 19:48:03.924433 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924439 kubelet[2003]: E0212 19:48:03.924443 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.924611 kubelet[2003]: E0212 19:48:03.924596 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.924611 kubelet[2003]: W0212 19:48:03.924606 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924686 kubelet[2003]: E0212 19:48:03.924618 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.924776 kubelet[2003]: E0212 19:48:03.924749 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.924776 kubelet[2003]: W0212 19:48:03.924757 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924776 kubelet[2003]: E0212 19:48:03.924779 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.924926 kubelet[2003]: E0212 19:48:03.924915 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.924926 kubelet[2003]: W0212 19:48:03.924923 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.924984 kubelet[2003]: E0212 19:48:03.924931 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.925088 kubelet[2003]: E0212 19:48:03.925078 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.925088 kubelet[2003]: W0212 19:48:03.925086 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.925133 kubelet[2003]: E0212 19:48:03.925095 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.925247 kubelet[2003]: E0212 19:48:03.925237 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.925247 kubelet[2003]: W0212 19:48:03.925245 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.925296 kubelet[2003]: E0212 19:48:03.925254 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.925477 kubelet[2003]: E0212 19:48:03.925447 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.925477 kubelet[2003]: W0212 19:48:03.925465 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.925477 kubelet[2003]: E0212 19:48:03.925488 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.925719 kubelet[2003]: E0212 19:48:03.925706 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.925719 kubelet[2003]: W0212 19:48:03.925715 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.925931 kubelet[2003]: E0212 19:48:03.925724 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.928588 kubelet[2003]: E0212 19:48:03.928562 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.928588 kubelet[2003]: W0212 19:48:03.928577 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.928588 kubelet[2003]: E0212 19:48:03.928596 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.928805 kubelet[2003]: E0212 19:48:03.928791 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.928805 kubelet[2003]: W0212 19:48:03.928802 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.928863 kubelet[2003]: E0212 19:48:03.928818 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.929010 kubelet[2003]: E0212 19:48:03.928985 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.929010 kubelet[2003]: W0212 19:48:03.928999 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.929093 kubelet[2003]: E0212 19:48:03.929017 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.929226 kubelet[2003]: E0212 19:48:03.929211 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.929226 kubelet[2003]: W0212 19:48:03.929220 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.929312 kubelet[2003]: E0212 19:48:03.929235 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.929429 kubelet[2003]: E0212 19:48:03.929402 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.929429 kubelet[2003]: W0212 19:48:03.929413 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.929429 kubelet[2003]: E0212 19:48:03.929430 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.929613 kubelet[2003]: E0212 19:48:03.929588 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.929613 kubelet[2003]: W0212 19:48:03.929607 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.929665 kubelet[2003]: E0212 19:48:03.929631 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.929827 kubelet[2003]: E0212 19:48:03.929813 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.929827 kubelet[2003]: W0212 19:48:03.929821 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.929913 kubelet[2003]: E0212 19:48:03.929834 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.930061 kubelet[2003]: E0212 19:48:03.930046 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.930061 kubelet[2003]: W0212 19:48:03.930057 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.930144 kubelet[2003]: E0212 19:48:03.930072 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.930229 kubelet[2003]: E0212 19:48:03.930215 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.930229 kubelet[2003]: W0212 19:48:03.930223 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.930301 kubelet[2003]: E0212 19:48:03.930253 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.930389 kubelet[2003]: E0212 19:48:03.930374 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.930389 kubelet[2003]: W0212 19:48:03.930385 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.930449 kubelet[2003]: E0212 19:48:03.930411 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.930538 kubelet[2003]: E0212 19:48:03.930523 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.930538 kubelet[2003]: W0212 19:48:03.930531 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.930608 kubelet[2003]: E0212 19:48:03.930546 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.930691 kubelet[2003]: E0212 19:48:03.930678 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.930691 kubelet[2003]: W0212 19:48:03.930686 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.930737 kubelet[2003]: E0212 19:48:03.930701 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.930876 kubelet[2003]: E0212 19:48:03.930859 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.930876 kubelet[2003]: W0212 19:48:03.930868 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.930936 kubelet[2003]: E0212 19:48:03.930882 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.931119 kubelet[2003]: E0212 19:48:03.931103 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.931119 kubelet[2003]: W0212 19:48:03.931114 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.931191 kubelet[2003]: E0212 19:48:03.931131 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.931281 kubelet[2003]: E0212 19:48:03.931269 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.931281 kubelet[2003]: W0212 19:48:03.931277 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.931328 kubelet[2003]: E0212 19:48:03.931289 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.931451 kubelet[2003]: E0212 19:48:03.931439 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.931451 kubelet[2003]: W0212 19:48:03.931449 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.931500 kubelet[2003]: E0212 19:48:03.931464 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.931636 kubelet[2003]: E0212 19:48:03.931622 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.931636 kubelet[2003]: W0212 19:48:03.931630 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.931636 kubelet[2003]: E0212 19:48:03.931639 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:03.931929 kubelet[2003]: E0212 19:48:03.931917 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:03.931929 kubelet[2003]: W0212 19:48:03.931926 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:03.931993 kubelet[2003]: E0212 19:48:03.931935 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.855564 kubelet[2003]: I0212 19:48:04.855533 2003 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:48:04.856047 kubelet[2003]: E0212 19:48:04.856024 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:04.932651 kubelet[2003]: E0212 19:48:04.932620 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.932651 kubelet[2003]: W0212 19:48:04.932648 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.932824 kubelet[2003]: E0212 19:48:04.932668 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.932872 kubelet[2003]: E0212 19:48:04.932841 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.932872 kubelet[2003]: W0212 19:48:04.932848 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.932872 kubelet[2003]: E0212 19:48:04.932857 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.932972 kubelet[2003]: E0212 19:48:04.932958 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.932972 kubelet[2003]: W0212 19:48:04.932967 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.932972 kubelet[2003]: E0212 19:48:04.932976 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.933082 kubelet[2003]: E0212 19:48:04.933072 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.933082 kubelet[2003]: W0212 19:48:04.933078 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.933162 kubelet[2003]: E0212 19:48:04.933087 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.933212 kubelet[2003]: E0212 19:48:04.933197 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.933212 kubelet[2003]: W0212 19:48:04.933206 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.933276 kubelet[2003]: E0212 19:48:04.933223 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.933478 kubelet[2003]: E0212 19:48:04.933442 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.933478 kubelet[2003]: W0212 19:48:04.933464 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.933478 kubelet[2003]: E0212 19:48:04.933488 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.933708 kubelet[2003]: E0212 19:48:04.933691 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.933752 kubelet[2003]: W0212 19:48:04.933725 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.933752 kubelet[2003]: E0212 19:48:04.933737 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.933924 kubelet[2003]: E0212 19:48:04.933906 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.933924 kubelet[2003]: W0212 19:48:04.933917 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.934006 kubelet[2003]: E0212 19:48:04.933929 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.934096 kubelet[2003]: E0212 19:48:04.934083 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.934096 kubelet[2003]: W0212 19:48:04.934092 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.934153 kubelet[2003]: E0212 19:48:04.934100 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.934239 kubelet[2003]: E0212 19:48:04.934229 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.934239 kubelet[2003]: W0212 19:48:04.934237 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.934287 kubelet[2003]: E0212 19:48:04.934246 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.934374 kubelet[2003]: E0212 19:48:04.934364 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.934374 kubelet[2003]: W0212 19:48:04.934372 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.934424 kubelet[2003]: E0212 19:48:04.934380 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.934519 kubelet[2003]: E0212 19:48:04.934509 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.934519 kubelet[2003]: W0212 19:48:04.934517 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.934569 kubelet[2003]: E0212 19:48:04.934525 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.934734 kubelet[2003]: E0212 19:48:04.934699 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.934734 kubelet[2003]: W0212 19:48:04.934721 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.934734 kubelet[2003]: E0212 19:48:04.934744 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.935022 kubelet[2003]: E0212 19:48:04.934997 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.935022 kubelet[2003]: W0212 19:48:04.935012 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.935022 kubelet[2003]: E0212 19:48:04.935021 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.935231 kubelet[2003]: E0212 19:48:04.935205 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.935231 kubelet[2003]: W0212 19:48:04.935226 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.935316 kubelet[2003]: E0212 19:48:04.935248 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.935555 kubelet[2003]: E0212 19:48:04.935520 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.935555 kubelet[2003]: W0212 19:48:04.935532 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.935555 kubelet[2003]: E0212 19:48:04.935545 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.935706 kubelet[2003]: E0212 19:48:04.935690 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.935706 kubelet[2003]: W0212 19:48:04.935699 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.935794 kubelet[2003]: E0212 19:48:04.935710 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.935916 kubelet[2003]: E0212 19:48:04.935897 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.935916 kubelet[2003]: W0212 19:48:04.935912 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.936003 kubelet[2003]: E0212 19:48:04.935925 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.936178 kubelet[2003]: E0212 19:48:04.936161 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.936178 kubelet[2003]: W0212 19:48:04.936172 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.936250 kubelet[2003]: E0212 19:48:04.936188 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.936369 kubelet[2003]: E0212 19:48:04.936350 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.936369 kubelet[2003]: W0212 19:48:04.936361 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.936450 kubelet[2003]: E0212 19:48:04.936379 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.936587 kubelet[2003]: E0212 19:48:04.936563 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.936587 kubelet[2003]: W0212 19:48:04.936574 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.936587 kubelet[2003]: E0212 19:48:04.936594 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937107 kubelet[2003]: E0212 19:48:04.936879 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937107 kubelet[2003]: W0212 19:48:04.936886 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.937107 kubelet[2003]: E0212 19:48:04.936902 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937225 kubelet[2003]: E0212 19:48:04.937114 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937225 kubelet[2003]: W0212 19:48:04.937123 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.937225 kubelet[2003]: E0212 19:48:04.937148 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937303 kubelet[2003]: E0212 19:48:04.937287 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937303 kubelet[2003]: W0212 19:48:04.937299 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.937353 kubelet[2003]: E0212 19:48:04.937313 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937461 kubelet[2003]: E0212 19:48:04.937449 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937461 kubelet[2003]: W0212 19:48:04.937457 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.937506 kubelet[2003]: E0212 19:48:04.937470 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937606 kubelet[2003]: E0212 19:48:04.937595 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937606 kubelet[2003]: W0212 19:48:04.937603 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.937653 kubelet[2003]: E0212 19:48:04.937628 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937743 kubelet[2003]: E0212 19:48:04.937733 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937743 kubelet[2003]: W0212 19:48:04.937741 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.937804 kubelet[2003]: E0212 19:48:04.937754 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.937946 kubelet[2003]: E0212 19:48:04.937932 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.937946 kubelet[2003]: W0212 19:48:04.937940 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.938017 kubelet[2003]: E0212 19:48:04.937953 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.938083 kubelet[2003]: E0212 19:48:04.938070 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.938083 kubelet[2003]: W0212 19:48:04.938080 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.938137 kubelet[2003]: E0212 19:48:04.938093 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.938288 kubelet[2003]: E0212 19:48:04.938270 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.938288 kubelet[2003]: W0212 19:48:04.938281 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.938337 kubelet[2003]: E0212 19:48:04.938297 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.938440 kubelet[2003]: E0212 19:48:04.938428 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.938440 kubelet[2003]: W0212 19:48:04.938438 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.938486 kubelet[2003]: E0212 19:48:04.938447 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.938588 kubelet[2003]: E0212 19:48:04.938578 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.938588 kubelet[2003]: W0212 19:48:04.938586 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.938636 kubelet[2003]: E0212 19:48:04.938600 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:04.938749 kubelet[2003]: E0212 19:48:04.938738 2003 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:04.938749 kubelet[2003]: W0212 19:48:04.938746 2003 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:04.938809 kubelet[2003]: E0212 19:48:04.938757 2003 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:05.658957 env[1123]: time="2024-02-12T19:48:05.658905814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:05.662964 env[1123]: time="2024-02-12T19:48:05.662914456Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:05.664811 env[1123]: time="2024-02-12T19:48:05.664781024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:05.666753 env[1123]: time="2024-02-12T19:48:05.666729680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:05.667606 env[1123]: time="2024-02-12T19:48:05.667573157Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:48:05.669224 env[1123]: time="2024-02-12T19:48:05.669196519Z" level=info msg="CreateContainer within sandbox \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:48:05.680614 env[1123]: time="2024-02-12T19:48:05.680580379Z" level=info msg="CreateContainer within sandbox \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3\"" Feb 12 19:48:05.680924 env[1123]: time="2024-02-12T19:48:05.680883325Z" level=info msg="StartContainer for \"6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3\"" Feb 12 19:48:05.697640 systemd[1]: Started cri-containerd-6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3.scope. Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712797 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 19:48:05.712912 kernel: audit: type=1400 audit(1707767285.706:1115): avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712930 kernel: audit: type=1300 audit(1707767285.706:1115): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe191cf8d88 items=0 ppid=2475 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:05.706000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe191cf8d88 items=0 ppid=2475 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:05.714526 kernel: audit: type=1327 audit(1707767285.706:1115): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373836376664663130636665326433616362626237353566383164 Feb 12 19:48:05.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373836376664663130636665326433616362626237353566383164 Feb 12 19:48:05.717655 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.720254 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.723448 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.723482 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.727190 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.729339 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.731668 kernel: audit: type=1400 audit(1707767285.706:1116): avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.706000 audit: BPF prog-id=133 op=LOAD Feb 12 19:48:05.706000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009b498 items=0 ppid=2475 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:05.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373836376664663130636665326433616362626237353566383164 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.707000 audit: BPF prog-id=134 op=LOAD Feb 12 19:48:05.707000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009b4e8 items=0 ppid=2475 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:05.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373836376664663130636665326433616362626237353566383164 Feb 12 19:48:05.712000 audit: BPF prog-id=134 op=UNLOAD Feb 12 19:48:05.712000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:05.712000 audit: BPF prog-id=135 op=LOAD Feb 12 19:48:05.712000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009b578 items=0 ppid=2475 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:05.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373836376664663130636665326433616362626237353566383164 Feb 12 19:48:05.734953 env[1123]: time="2024-02-12T19:48:05.734917306Z" level=info msg="StartContainer for \"6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3\" returns successfully" Feb 12 19:48:05.742874 systemd[1]: cri-containerd-6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3.scope: Deactivated successfully. Feb 12 19:48:05.746000 audit: BPF prog-id=135 op=UNLOAD Feb 12 19:48:05.760220 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3-rootfs.mount: Deactivated successfully. Feb 12 19:48:05.810835 kubelet[2003]: E0212 19:48:05.810780 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:05.860781 kubelet[2003]: E0212 19:48:05.858402 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:06.121705 env[1123]: time="2024-02-12T19:48:06.121647276Z" level=info msg="shim disconnected" id=6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3 Feb 12 19:48:06.121705 env[1123]: time="2024-02-12T19:48:06.121699253Z" level=warning msg="cleaning up after shim disconnected" id=6b7867fdf10cfe2d3acbbb755f81dfd81a7db9b7700ca579f080af86a6f928d3 namespace=k8s.io Feb 12 19:48:06.121888 env[1123]: time="2024-02-12T19:48:06.121709054Z" level=info msg="cleaning up dead shim" Feb 12 19:48:06.127577 env[1123]: time="2024-02-12T19:48:06.127530571Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2677 runtime=io.containerd.runc.v2\n" Feb 12 19:48:06.861803 kubelet[2003]: E0212 19:48:06.861090 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:06.862131 env[1123]: time="2024-02-12T19:48:06.861660243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:48:07.811004 kubelet[2003]: E0212 19:48:07.810965 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:08.128674 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1961148488.mount: Deactivated successfully. Feb 12 19:48:09.811792 kubelet[2003]: E0212 19:48:09.811011 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:11.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.138:22-10.0.0.1:34476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:11.803221 systemd[1]: Started sshd@7-10.0.0.138:22-10.0.0.1:34476.service. Feb 12 19:48:11.804086 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:48:11.804122 kernel: audit: type=1130 audit(1707767291.801:1122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.138:22-10.0.0.1:34476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:11.811497 kubelet[2003]: E0212 19:48:11.811449 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:11.835000 audit[2691]: USER_ACCT pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.837545 sshd[2691]: Accepted publickey for core from 10.0.0.1 port 34476 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:11.842799 sshd[2691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:11.837000 audit[2691]: CRED_ACQ pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.845991 systemd-logind[1110]: New session 8 of user core. Feb 12 19:48:11.846691 systemd[1]: Started session-8.scope. Feb 12 19:48:11.847609 kernel: audit: type=1101 audit(1707767291.835:1123): pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.847664 kernel: audit: type=1103 audit(1707767291.837:1124): pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.847755 kernel: audit: type=1006 audit(1707767291.837:1125): pid=2691 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 12 19:48:11.837000 audit[2691]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0a467120 a2=3 a3=0 items=0 ppid=1 pid=2691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.851784 kernel: audit: type=1300 audit(1707767291.837:1125): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0a467120 a2=3 a3=0 items=0 ppid=1 pid=2691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.851832 kernel: audit: type=1327 audit(1707767291.837:1125): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:11.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:11.849000 audit[2691]: USER_START pid=2691 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.855531 kernel: audit: type=1105 audit(1707767291.849:1126): pid=2691 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.855559 kernel: audit: type=1103 audit(1707767291.850:1127): pid=2693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.850000 audit[2693]: CRED_ACQ pid=2693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.887607 env[1123]: time="2024-02-12T19:48:11.887565533Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:11.889028 env[1123]: time="2024-02-12T19:48:11.888986696Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:11.890667 env[1123]: time="2024-02-12T19:48:11.890630502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:11.891985 env[1123]: time="2024-02-12T19:48:11.891953415Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:11.892734 env[1123]: time="2024-02-12T19:48:11.892700526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:48:11.895296 env[1123]: time="2024-02-12T19:48:11.895270807Z" level=info msg="CreateContainer within sandbox \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:48:11.906932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount682641815.mount: Deactivated successfully. Feb 12 19:48:11.912609 env[1123]: time="2024-02-12T19:48:11.912578248Z" level=info msg="CreateContainer within sandbox \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5\"" Feb 12 19:48:11.913335 env[1123]: time="2024-02-12T19:48:11.913317813Z" level=info msg="StartContainer for \"9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5\"" Feb 12 19:48:11.932233 systemd[1]: Started cri-containerd-9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5.scope. Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.963992 kernel: audit: type=1400 audit(1707767291.949:1128): avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.964081 kernel: audit: type=1300 audit(1707767291.949:1128): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f00eb7cb4a8 items=0 ppid=2475 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.949000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f00eb7cb4a8 items=0 ppid=2475 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326663656132356163396631333432396566393939613433636438 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.949000 audit: BPF prog-id=136 op=LOAD Feb 12 19:48:11.949000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000230808 items=0 ppid=2475 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326663656132356163396631333432396566393939613433636438 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit: BPF prog-id=137 op=LOAD Feb 12 19:48:11.954000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000230858 items=0 ppid=2475 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326663656132356163396631333432396566393939613433636438 Feb 12 19:48:11.954000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:48:11.954000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:11.954000 audit: BPF prog-id=138 op=LOAD Feb 12 19:48:11.954000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002308e8 items=0 ppid=2475 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:11.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326663656132356163396631333432396566393939613433636438 Feb 12 19:48:11.979236 sshd[2691]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:11.980000 audit[2691]: USER_END pid=2691 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.980000 audit[2691]: CRED_DISP pid=2691 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.982917 systemd[1]: sshd@7-10.0.0.138:22-10.0.0.1:34476.service: Deactivated successfully. Feb 12 19:48:11.983615 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:48:11.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.138:22-10.0.0.1:34476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:11.984158 systemd-logind[1110]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:48:11.984794 systemd-logind[1110]: Removed session 8. Feb 12 19:48:12.308901 env[1123]: time="2024-02-12T19:48:12.308835745Z" level=info msg="StartContainer for \"9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5\" returns successfully" Feb 12 19:48:12.877060 kubelet[2003]: E0212 19:48:12.877037 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:12.904251 systemd[1]: run-containerd-runc-k8s.io-9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5-runc.VtP9Lv.mount: Deactivated successfully. Feb 12 19:48:13.292324 systemd[1]: cri-containerd-9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5.scope: Deactivated successfully. Feb 12 19:48:13.295000 audit: BPF prog-id=138 op=UNLOAD Feb 12 19:48:13.307993 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5-rootfs.mount: Deactivated successfully. Feb 12 19:48:13.312195 env[1123]: time="2024-02-12T19:48:13.312155275Z" level=info msg="shim disconnected" id=9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5 Feb 12 19:48:13.312195 env[1123]: time="2024-02-12T19:48:13.312198083Z" level=warning msg="cleaning up after shim disconnected" id=9f2fcea25ac9f13429ef999a43cd8eec0b022c921e2c4812c715d9ae046f70e5 namespace=k8s.io Feb 12 19:48:13.312195 env[1123]: time="2024-02-12T19:48:13.312207662Z" level=info msg="cleaning up dead shim" Feb 12 19:48:13.317968 env[1123]: time="2024-02-12T19:48:13.317933505Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2763 runtime=io.containerd.runc.v2\n" Feb 12 19:48:13.339255 kubelet[2003]: I0212 19:48:13.339235 2003 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:48:13.353316 kubelet[2003]: I0212 19:48:13.353276 2003 topology_manager.go:215] "Topology Admit Handler" podUID="3d008a86-1d84-4dcc-aede-ea273decf925" podNamespace="calico-system" podName="calico-kube-controllers-77d88cd86-8xd4n" Feb 12 19:48:13.356435 kubelet[2003]: I0212 19:48:13.356349 2003 topology_manager.go:215] "Topology Admit Handler" podUID="506f33e4-3d3f-4a50-a96b-ea5d9882a996" podNamespace="kube-system" podName="coredns-5dd5756b68-wkx66" Feb 12 19:48:13.357809 kubelet[2003]: I0212 19:48:13.357590 2003 topology_manager.go:215] "Topology Admit Handler" podUID="6d7279c7-efea-491e-8c38-1ef05d7e0bea" podNamespace="kube-system" podName="coredns-5dd5756b68-jtdsf" Feb 12 19:48:13.359905 systemd[1]: Created slice kubepods-besteffort-pod3d008a86_1d84_4dcc_aede_ea273decf925.slice. Feb 12 19:48:13.365570 systemd[1]: Created slice kubepods-burstable-pod506f33e4_3d3f_4a50_a96b_ea5d9882a996.slice. Feb 12 19:48:13.368682 systemd[1]: Created slice kubepods-burstable-pod6d7279c7_efea_491e_8c38_1ef05d7e0bea.slice. Feb 12 19:48:13.492717 kubelet[2003]: I0212 19:48:13.492687 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g5brh\" (UniqueName: \"kubernetes.io/projected/3d008a86-1d84-4dcc-aede-ea273decf925-kube-api-access-g5brh\") pod \"calico-kube-controllers-77d88cd86-8xd4n\" (UID: \"3d008a86-1d84-4dcc-aede-ea273decf925\") " pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" Feb 12 19:48:13.492717 kubelet[2003]: I0212 19:48:13.492722 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/506f33e4-3d3f-4a50-a96b-ea5d9882a996-config-volume\") pod \"coredns-5dd5756b68-wkx66\" (UID: \"506f33e4-3d3f-4a50-a96b-ea5d9882a996\") " pod="kube-system/coredns-5dd5756b68-wkx66" Feb 12 19:48:13.492920 kubelet[2003]: I0212 19:48:13.492740 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cc9gg\" (UniqueName: \"kubernetes.io/projected/506f33e4-3d3f-4a50-a96b-ea5d9882a996-kube-api-access-cc9gg\") pod \"coredns-5dd5756b68-wkx66\" (UID: \"506f33e4-3d3f-4a50-a96b-ea5d9882a996\") " pod="kube-system/coredns-5dd5756b68-wkx66" Feb 12 19:48:13.492920 kubelet[2003]: I0212 19:48:13.492780 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3d008a86-1d84-4dcc-aede-ea273decf925-tigera-ca-bundle\") pod \"calico-kube-controllers-77d88cd86-8xd4n\" (UID: \"3d008a86-1d84-4dcc-aede-ea273decf925\") " pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" Feb 12 19:48:13.492920 kubelet[2003]: I0212 19:48:13.492860 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqw4s\" (UniqueName: \"kubernetes.io/projected/6d7279c7-efea-491e-8c38-1ef05d7e0bea-kube-api-access-dqw4s\") pod \"coredns-5dd5756b68-jtdsf\" (UID: \"6d7279c7-efea-491e-8c38-1ef05d7e0bea\") " pod="kube-system/coredns-5dd5756b68-jtdsf" Feb 12 19:48:13.493010 kubelet[2003]: I0212 19:48:13.492987 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6d7279c7-efea-491e-8c38-1ef05d7e0bea-config-volume\") pod \"coredns-5dd5756b68-jtdsf\" (UID: \"6d7279c7-efea-491e-8c38-1ef05d7e0bea\") " pod="kube-system/coredns-5dd5756b68-jtdsf" Feb 12 19:48:13.664144 env[1123]: time="2024-02-12T19:48:13.664106038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d88cd86-8xd4n,Uid:3d008a86-1d84-4dcc-aede-ea273decf925,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:13.667356 kubelet[2003]: E0212 19:48:13.667335 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:13.668049 env[1123]: time="2024-02-12T19:48:13.668018375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wkx66,Uid:506f33e4-3d3f-4a50-a96b-ea5d9882a996,Namespace:kube-system,Attempt:0,}" Feb 12 19:48:13.671726 kubelet[2003]: E0212 19:48:13.671703 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:13.672114 env[1123]: time="2024-02-12T19:48:13.672081148Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jtdsf,Uid:6d7279c7-efea-491e-8c38-1ef05d7e0bea,Namespace:kube-system,Attempt:0,}" Feb 12 19:48:13.743772 env[1123]: time="2024-02-12T19:48:13.743679884Z" level=error msg="Failed to destroy network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.744067 env[1123]: time="2024-02-12T19:48:13.744034181Z" level=error msg="encountered an error cleaning up failed sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.744276 env[1123]: time="2024-02-12T19:48:13.744247755Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d88cd86-8xd4n,Uid:3d008a86-1d84-4dcc-aede-ea273decf925,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.744922 kubelet[2003]: E0212 19:48:13.744579 2003 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.744922 kubelet[2003]: E0212 19:48:13.744635 2003 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" Feb 12 19:48:13.744922 kubelet[2003]: E0212 19:48:13.744654 2003 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" Feb 12 19:48:13.745070 kubelet[2003]: E0212 19:48:13.744699 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-77d88cd86-8xd4n_calico-system(3d008a86-1d84-4dcc-aede-ea273decf925)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-77d88cd86-8xd4n_calico-system(3d008a86-1d84-4dcc-aede-ea273decf925)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" podUID="3d008a86-1d84-4dcc-aede-ea273decf925" Feb 12 19:48:13.746820 env[1123]: time="2024-02-12T19:48:13.746793774Z" level=error msg="Failed to destroy network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.747232 env[1123]: time="2024-02-12T19:48:13.747205648Z" level=error msg="encountered an error cleaning up failed sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.747358 env[1123]: time="2024-02-12T19:48:13.747310621Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jtdsf,Uid:6d7279c7-efea-491e-8c38-1ef05d7e0bea,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.747513 env[1123]: time="2024-02-12T19:48:13.747391014Z" level=error msg="Failed to destroy network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.747665 kubelet[2003]: E0212 19:48:13.747618 2003 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.747665 kubelet[2003]: E0212 19:48:13.747675 2003 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-jtdsf" Feb 12 19:48:13.747876 kubelet[2003]: E0212 19:48:13.747693 2003 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-jtdsf" Feb 12 19:48:13.747876 kubelet[2003]: E0212 19:48:13.747746 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-jtdsf_kube-system(6d7279c7-efea-491e-8c38-1ef05d7e0bea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-jtdsf_kube-system(6d7279c7-efea-491e-8c38-1ef05d7e0bea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-jtdsf" podUID="6d7279c7-efea-491e-8c38-1ef05d7e0bea" Feb 12 19:48:13.747971 env[1123]: time="2024-02-12T19:48:13.747869884Z" level=error msg="encountered an error cleaning up failed sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.748897 env[1123]: time="2024-02-12T19:48:13.748846964Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wkx66,Uid:506f33e4-3d3f-4a50-a96b-ea5d9882a996,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.749100 kubelet[2003]: E0212 19:48:13.749057 2003 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.749100 kubelet[2003]: E0212 19:48:13.749094 2003 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wkx66" Feb 12 19:48:13.749172 kubelet[2003]: E0212 19:48:13.749110 2003 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wkx66" Feb 12 19:48:13.749172 kubelet[2003]: E0212 19:48:13.749152 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-wkx66_kube-system(506f33e4-3d3f-4a50-a96b-ea5d9882a996)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-wkx66_kube-system(506f33e4-3d3f-4a50-a96b-ea5d9882a996)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wkx66" podUID="506f33e4-3d3f-4a50-a96b-ea5d9882a996" Feb 12 19:48:13.815668 systemd[1]: Created slice kubepods-besteffort-pod902e07e6_2c2f_4c9d_9de4_300d08b5a396.slice. Feb 12 19:48:13.817137 env[1123]: time="2024-02-12T19:48:13.817105942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvkq8,Uid:902e07e6-2c2f-4c9d-9de4-300d08b5a396,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:13.863938 env[1123]: time="2024-02-12T19:48:13.863877599Z" level=error msg="Failed to destroy network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.864196 env[1123]: time="2024-02-12T19:48:13.864164840Z" level=error msg="encountered an error cleaning up failed sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.864231 env[1123]: time="2024-02-12T19:48:13.864214131Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvkq8,Uid:902e07e6-2c2f-4c9d-9de4-300d08b5a396,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.864402 kubelet[2003]: E0212 19:48:13.864382 2003 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.864454 kubelet[2003]: E0212 19:48:13.864419 2003 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:13.864454 kubelet[2003]: E0212 19:48:13.864437 2003 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nvkq8" Feb 12 19:48:13.864505 kubelet[2003]: E0212 19:48:13.864482 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nvkq8_calico-system(902e07e6-2c2f-4c9d-9de4-300d08b5a396)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nvkq8_calico-system(902e07e6-2c2f-4c9d-9de4-300d08b5a396)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:13.880294 kubelet[2003]: E0212 19:48:13.880261 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:13.882305 kubelet[2003]: I0212 19:48:13.882026 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:13.887817 env[1123]: time="2024-02-12T19:48:13.882698577Z" level=info msg="StopPodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\"" Feb 12 19:48:13.887817 env[1123]: time="2024-02-12T19:48:13.883088907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:48:13.887817 env[1123]: time="2024-02-12T19:48:13.884461048Z" level=info msg="StopPodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\"" Feb 12 19:48:13.887817 env[1123]: time="2024-02-12T19:48:13.885972912Z" level=info msg="StopPodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\"" Feb 12 19:48:13.887817 env[1123]: time="2024-02-12T19:48:13.887154877Z" level=info msg="StopPodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\"" Feb 12 19:48:13.888033 kubelet[2003]: I0212 19:48:13.884127 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:13.888033 kubelet[2003]: I0212 19:48:13.885435 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:13.888033 kubelet[2003]: I0212 19:48:13.886595 2003 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:13.905306 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd-shm.mount: Deactivated successfully. Feb 12 19:48:13.911974 env[1123]: time="2024-02-12T19:48:13.911915491Z" level=error msg="StopPodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" failed" error="failed to destroy network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.912471 kubelet[2003]: E0212 19:48:13.912443 2003 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:13.912535 kubelet[2003]: E0212 19:48:13.912523 2003 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2"} Feb 12 19:48:13.912564 kubelet[2003]: E0212 19:48:13.912554 2003 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"506f33e4-3d3f-4a50-a96b-ea5d9882a996\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:13.912629 kubelet[2003]: E0212 19:48:13.912581 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"506f33e4-3d3f-4a50-a96b-ea5d9882a996\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wkx66" podUID="506f33e4-3d3f-4a50-a96b-ea5d9882a996" Feb 12 19:48:13.920974 env[1123]: time="2024-02-12T19:48:13.920874456Z" level=error msg="StopPodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" failed" error="failed to destroy network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.921556 kubelet[2003]: E0212 19:48:13.921522 2003 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:13.921617 kubelet[2003]: E0212 19:48:13.921572 2003 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15"} Feb 12 19:48:13.921617 kubelet[2003]: E0212 19:48:13.921604 2003 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:13.921706 kubelet[2003]: E0212 19:48:13.921631 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"902e07e6-2c2f-4c9d-9de4-300d08b5a396\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nvkq8" podUID="902e07e6-2c2f-4c9d-9de4-300d08b5a396" Feb 12 19:48:13.923968 env[1123]: time="2024-02-12T19:48:13.923938754Z" level=error msg="StopPodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" failed" error="failed to destroy network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.924286 kubelet[2003]: E0212 19:48:13.924163 2003 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:13.924286 kubelet[2003]: E0212 19:48:13.924200 2003 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd"} Feb 12 19:48:13.924286 kubelet[2003]: E0212 19:48:13.924232 2003 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d008a86-1d84-4dcc-aede-ea273decf925\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:13.924286 kubelet[2003]: E0212 19:48:13.924265 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d008a86-1d84-4dcc-aede-ea273decf925\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" podUID="3d008a86-1d84-4dcc-aede-ea273decf925" Feb 12 19:48:13.929336 env[1123]: time="2024-02-12T19:48:13.929284547Z" level=error msg="StopPodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" failed" error="failed to destroy network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:13.929577 kubelet[2003]: E0212 19:48:13.929542 2003 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:13.929633 kubelet[2003]: E0212 19:48:13.929589 2003 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180"} Feb 12 19:48:13.929633 kubelet[2003]: E0212 19:48:13.929623 2003 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6d7279c7-efea-491e-8c38-1ef05d7e0bea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:13.929712 kubelet[2003]: E0212 19:48:13.929663 2003 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6d7279c7-efea-491e-8c38-1ef05d7e0bea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-jtdsf" podUID="6d7279c7-efea-491e-8c38-1ef05d7e0bea" Feb 12 19:48:16.983568 systemd[1]: Started sshd@8-10.0.0.138:22-10.0.0.1:48138.service. Feb 12 19:48:16.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.138:22-10.0.0.1:48138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:16.987355 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 12 19:48:16.987474 kernel: audit: type=1130 audit(1707767296.982:1138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.138:22-10.0.0.1:48138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:17.015000 audit[3025]: USER_ACCT pid=3025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.016624 sshd[3025]: Accepted publickey for core from 10.0.0.1 port 48138 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:17.018291 sshd[3025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:17.017000 audit[3025]: CRED_ACQ pid=3025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.021612 kernel: audit: type=1101 audit(1707767297.015:1139): pid=3025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.021663 kernel: audit: type=1103 audit(1707767297.017:1140): pid=3025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.021685 kernel: audit: type=1006 audit(1707767297.017:1141): pid=3025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 19:48:17.021323 systemd-logind[1110]: New session 9 of user core. Feb 12 19:48:17.022048 systemd[1]: Started session-9.scope. Feb 12 19:48:17.017000 audit[3025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa324ad50 a2=3 a3=0 items=0 ppid=1 pid=3025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.026846 kernel: audit: type=1300 audit(1707767297.017:1141): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa324ad50 a2=3 a3=0 items=0 ppid=1 pid=3025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.026904 kernel: audit: type=1327 audit(1707767297.017:1141): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:17.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:17.024000 audit[3025]: USER_START pid=3025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.029931 kernel: audit: type=1105 audit(1707767297.024:1142): pid=3025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.030012 kernel: audit: type=1103 audit(1707767297.025:1143): pid=3027 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.025000 audit[3027]: CRED_ACQ pid=3027 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.124611 sshd[3025]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:17.123000 audit[3025]: USER_END pid=3025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.126594 systemd[1]: sshd@8-10.0.0.138:22-10.0.0.1:48138.service: Deactivated successfully. Feb 12 19:48:17.127327 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:48:17.127837 systemd-logind[1110]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:48:17.128459 systemd-logind[1110]: Removed session 9. Feb 12 19:48:17.123000 audit[3025]: CRED_DISP pid=3025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.130882 kernel: audit: type=1106 audit(1707767297.123:1144): pid=3025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.130930 kernel: audit: type=1104 audit(1707767297.123:1145): pid=3025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:17.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.138:22-10.0.0.1:48138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:21.995215 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2515474386.mount: Deactivated successfully. Feb 12 19:48:22.129281 systemd[1]: Started sshd@9-10.0.0.138:22-10.0.0.1:48150.service. Feb 12 19:48:22.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.138:22-10.0.0.1:48150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:22.129970 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:48:22.130038 kernel: audit: type=1130 audit(1707767302.128:1147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.138:22-10.0.0.1:48150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:22.885717 kubelet[2003]: I0212 19:48:22.885684 2003 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:48:22.886253 kubelet[2003]: E0212 19:48:22.886213 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:22.899916 kubelet[2003]: E0212 19:48:22.899891 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:23.429000 audit[3043]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.429000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd22b59490 a2=0 a3=7ffd22b5947c items=0 ppid=2204 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.437805 kernel: audit: type=1325 audit(1707767303.429:1148): table=filter:95 family=2 entries=15 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.437946 kernel: audit: type=1300 audit(1707767303.429:1148): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd22b59490 a2=0 a3=7ffd22b5947c items=0 ppid=2204 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.437979 kernel: audit: type=1327 audit(1707767303.429:1148): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.430000 audit[3043]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.430000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd22b59490 a2=0 a3=7ffd22b5947c items=0 ppid=2204 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.448124 env[1123]: time="2024-02-12T19:48:23.448080649Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.449853 env[1123]: time="2024-02-12T19:48:23.449830439Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.449965 kernel: audit: type=1325 audit(1707767303.430:1149): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.450026 kernel: audit: type=1300 audit(1707767303.430:1149): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd22b59490 a2=0 a3=7ffd22b5947c items=0 ppid=2204 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.451419 env[1123]: time="2024-02-12T19:48:23.451381904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.452114 kernel: audit: type=1327 audit(1707767303.430:1149): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.452777 env[1123]: time="2024-02-12T19:48:23.452732298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.453236 env[1123]: time="2024-02-12T19:48:23.453210172Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:48:23.454000 audit[3040]: USER_ACCT pid=3040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.456908 sshd[3040]: Accepted publickey for core from 10.0.0.1 port 48150 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:23.457668 sshd[3040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:23.456000 audit[3040]: CRED_ACQ pid=3040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.460342 kernel: audit: type=1101 audit(1707767303.454:1150): pid=3040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.460392 kernel: audit: type=1103 audit(1707767303.456:1151): pid=3040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.460418 kernel: audit: type=1006 audit(1707767303.456:1152): pid=3040 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:48:23.456000 audit[3040]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeef3ac7c0 a2=3 a3=0 items=0 ppid=1 pid=3040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:23.466077 env[1123]: time="2024-02-12T19:48:23.466025134Z" level=info msg="CreateContainer within sandbox \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:48:23.466377 systemd-logind[1110]: New session 10 of user core. Feb 12 19:48:23.467260 systemd[1]: Started session-10.scope. Feb 12 19:48:23.471000 audit[3040]: USER_START pid=3040 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.476000 audit[3046]: CRED_ACQ pid=3046 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.478645 env[1123]: time="2024-02-12T19:48:23.478604346Z" level=info msg="CreateContainer within sandbox \"c7d126d2720222c92c9ff9ee48249723d6b7be02a84614fd05e542b8751cba4f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"23ce687b1dd7aa4032efcca0069f05acb190767d0ff86782ba9028f5dedf2141\"" Feb 12 19:48:23.479107 env[1123]: time="2024-02-12T19:48:23.479078442Z" level=info msg="StartContainer for \"23ce687b1dd7aa4032efcca0069f05acb190767d0ff86782ba9028f5dedf2141\"" Feb 12 19:48:23.494379 systemd[1]: Started cri-containerd-23ce687b1dd7aa4032efcca0069f05acb190767d0ff86782ba9028f5dedf2141.scope. Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fce450982f8 items=0 ppid=2475 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636536383762316464376161343033326566636361303036396630 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.510000 audit: BPF prog-id=139 op=LOAD Feb 12 19:48:23.510000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024b68 items=0 ppid=2475 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636536383762316464376161343033326566636361303036396630 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit: BPF prog-id=140 op=LOAD Feb 12 19:48:23.511000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024bb8 items=0 ppid=2475 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636536383762316464376161343033326566636361303036396630 Feb 12 19:48:23.511000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:48:23.511000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.511000 audit: BPF prog-id=141 op=LOAD Feb 12 19:48:23.511000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024c48 items=0 ppid=2475 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636536383762316464376161343033326566636361303036396630 Feb 12 19:48:23.526320 env[1123]: time="2024-02-12T19:48:23.526283274Z" level=info msg="StartContainer for \"23ce687b1dd7aa4032efcca0069f05acb190767d0ff86782ba9028f5dedf2141\" returns successfully" Feb 12 19:48:23.585608 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:48:23.585731 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:48:23.596518 sshd[3040]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:23.596000 audit[3040]: USER_END pid=3040 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.596000 audit[3040]: CRED_DISP pid=3040 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:23.598907 systemd[1]: sshd@9-10.0.0.138:22-10.0.0.1:48150.service: Deactivated successfully. Feb 12 19:48:23.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.138:22-10.0.0.1:48150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.599564 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:48:23.600047 systemd-logind[1110]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:48:23.600706 systemd-logind[1110]: Removed session 10. Feb 12 19:48:23.904214 kubelet[2003]: E0212 19:48:23.904179 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:24.811654 env[1123]: time="2024-02-12T19:48:24.811578110Z" level=info msg="StopPodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\"" Feb 12 19:48:24.811997 env[1123]: time="2024-02-12T19:48:24.811730544Z" level=info msg="StopPodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\"" Feb 12 19:48:24.873469 kubelet[2003]: I0212 19:48:24.873416 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-bsdq2" podStartSLOduration=1.968158876 podCreationTimestamp="2024-02-12 19:48:00 +0000 UTC" firstStartedPulling="2024-02-12 19:48:00.548228921 +0000 UTC m=+20.828496532" lastFinishedPulling="2024-02-12 19:48:23.453448667 +0000 UTC m=+43.733716288" observedRunningTime="2024-02-12 19:48:24.067048543 +0000 UTC m=+44.347316164" watchObservedRunningTime="2024-02-12 19:48:24.873378632 +0000 UTC m=+45.153646243" Feb 12 19:48:24.908982 kubelet[2003]: E0212 19:48:24.908643 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:24.927455 systemd[1]: run-containerd-runc-k8s.io-23ce687b1dd7aa4032efcca0069f05acb190767d0ff86782ba9028f5dedf2141-runc.N1lD59.mount: Deactivated successfully. Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.873 [INFO][3184] k8s.go 578: Cleaning up netns ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.873 [INFO][3184] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" iface="eth0" netns="/var/run/netns/cni-858d3ba8-bc86-f583-99e2-b76610316e5e" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.873 [INFO][3184] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" iface="eth0" netns="/var/run/netns/cni-858d3ba8-bc86-f583-99e2-b76610316e5e" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.873 [INFO][3184] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" iface="eth0" netns="/var/run/netns/cni-858d3ba8-bc86-f583-99e2-b76610316e5e" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.873 [INFO][3184] k8s.go 585: Releasing IP address(es) ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.873 [INFO][3184] utils.go 188: Calico CNI releasing IP address ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.915 [INFO][3201] ipam_plugin.go 415: Releasing address using handleID ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.916 [INFO][3201] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.916 [INFO][3201] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.927 [WARNING][3201] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.927 [INFO][3201] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.929 [INFO][3201] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:24.936119 env[1123]: 2024-02-12 19:48:24.930 [INFO][3184] k8s.go 591: Teardown processing complete. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:24.938950 env[1123]: time="2024-02-12T19:48:24.938912693Z" level=info msg="TearDown network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" successfully" Feb 12 19:48:24.939044 env[1123]: time="2024-02-12T19:48:24.939021801Z" level=info msg="StopPodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" returns successfully" Feb 12 19:48:24.939600 systemd[1]: run-netns-cni\x2d858d3ba8\x2dbc86\x2df583\x2d99e2\x2db76610316e5e.mount: Deactivated successfully. Feb 12 19:48:24.940294 env[1123]: time="2024-02-12T19:48:24.939826103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d88cd86-8xd4n,Uid:3d008a86-1d84-4dcc-aede-ea273decf925,Namespace:calico-system,Attempt:1,}" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.872 [INFO][3185] k8s.go 578: Cleaning up netns ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.873 [INFO][3185] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" iface="eth0" netns="/var/run/netns/cni-86298733-b808-f5af-98a6-99e35c324773" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.873 [INFO][3185] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" iface="eth0" netns="/var/run/netns/cni-86298733-b808-f5af-98a6-99e35c324773" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.873 [INFO][3185] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" iface="eth0" netns="/var/run/netns/cni-86298733-b808-f5af-98a6-99e35c324773" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.873 [INFO][3185] k8s.go 585: Releasing IP address(es) ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.873 [INFO][3185] utils.go 188: Calico CNI releasing IP address ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.916 [INFO][3200] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.916 [INFO][3200] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.929 [INFO][3200] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.935 [WARNING][3200] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.935 [INFO][3200] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.942 [INFO][3200] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:24.945447 env[1123]: 2024-02-12 19:48:24.944 [INFO][3185] k8s.go 591: Teardown processing complete. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:24.945803 env[1123]: time="2024-02-12T19:48:24.945583616Z" level=info msg="TearDown network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" successfully" Feb 12 19:48:24.945803 env[1123]: time="2024-02-12T19:48:24.945602623Z" level=info msg="StopPodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" returns successfully" Feb 12 19:48:24.946110 env[1123]: time="2024-02-12T19:48:24.946080255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvkq8,Uid:902e07e6-2c2f-4c9d-9de4-300d08b5a396,Namespace:calico-system,Attempt:1,}" Feb 12 19:48:25.119420 systemd-networkd[1018]: cali4f950f8942f: Link UP Feb 12 19:48:25.119569 systemd-networkd[1018]: cali4f950f8942f: Gained carrier Feb 12 19:48:25.119916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f950f8942f: link becomes ready Feb 12 19:48:25.136000 audit[3335]: AVC avc: denied { write } for pid=3335 comm="tee" name="fd" dev="proc" ino=23354 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.136000 audit[3335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0a66d993 a2=241 a3=1b6 items=1 ppid=3298 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.136000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:48:25.136000 audit: PATH item=0 name="/dev/fd/63" inode=23351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.136000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.044 [INFO][3239] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.060 [INFO][3239] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0 calico-kube-controllers-77d88cd86- calico-system 3d008a86-1d84-4dcc-aede-ea273decf925 770 0 2024-02-12 19:48:00 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:77d88cd86 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-77d88cd86-8xd4n eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4f950f8942f [] []}} ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.060 [INFO][3239] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.081 [INFO][3273] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" HandleID="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.090 [INFO][3273] ipam_plugin.go 268: Auto assigning IP ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" HandleID="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029fb70), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-77d88cd86-8xd4n", "timestamp":"2024-02-12 19:48:25.081157564 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.091 [INFO][3273] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.091 [INFO][3273] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.091 [INFO][3273] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.092 [INFO][3273] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.095 [INFO][3273] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.097 [INFO][3273] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.098 [INFO][3273] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.099 [INFO][3273] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.099 [INFO][3273] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.100 [INFO][3273] ipam.go 1682: Creating new handle: k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953 Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.103 [INFO][3273] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.106 [INFO][3273] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.106 [INFO][3273] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" host="localhost" Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.106 [INFO][3273] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:25.140891 env[1123]: 2024-02-12 19:48:25.106 [INFO][3273] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" HandleID="k8s-pod-network.f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.141682 env[1123]: 2024-02-12 19:48:25.110 [INFO][3239] k8s.go 385: Populated endpoint ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0", GenerateName:"calico-kube-controllers-77d88cd86-", Namespace:"calico-system", SelfLink:"", UID:"3d008a86-1d84-4dcc-aede-ea273decf925", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d88cd86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-77d88cd86-8xd4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f950f8942f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:25.141682 env[1123]: 2024-02-12 19:48:25.110 [INFO][3239] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.141682 env[1123]: 2024-02-12 19:48:25.110 [INFO][3239] dataplane_linux.go 68: Setting the host side veth name to cali4f950f8942f ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.141682 env[1123]: 2024-02-12 19:48:25.118 [INFO][3239] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.141682 env[1123]: 2024-02-12 19:48:25.118 [INFO][3239] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0", GenerateName:"calico-kube-controllers-77d88cd86-", Namespace:"calico-system", SelfLink:"", UID:"3d008a86-1d84-4dcc-aede-ea273decf925", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d88cd86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953", Pod:"calico-kube-controllers-77d88cd86-8xd4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f950f8942f", MAC:"c2:e7:1b:6d:49:da", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:25.141682 env[1123]: 2024-02-12 19:48:25.128 [INFO][3239] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953" Namespace="calico-system" Pod="calico-kube-controllers-77d88cd86-8xd4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:25.144000 audit[3334]: AVC avc: denied { write } for pid=3334 comm="tee" name="fd" dev="proc" ino=26055 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.144000 audit[3334]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1b4ab984 a2=241 a3=1b6 items=1 ppid=3320 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.144000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:48:25.144000 audit: PATH item=0 name="/dev/fd/63" inode=26043 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.152000 audit[3361]: AVC avc: denied { write } for pid=3361 comm="tee" name="fd" dev="proc" ino=26069 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.152000 audit[3361]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4abbc993 a2=241 a3=1b6 items=1 ppid=3295 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.152000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:48:25.152000 audit: PATH item=0 name="/dev/fd/63" inode=26063 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.154000 audit[3363]: AVC avc: denied { write } for pid=3363 comm="tee" name="fd" dev="proc" ino=26073 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.154000 audit[3363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff52b6b983 a2=241 a3=1b6 items=1 ppid=3292 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.154000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:48:25.154000 audit: PATH item=0 name="/dev/fd/63" inode=26066 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.154000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.167000 audit[3370]: AVC avc: denied { write } for pid=3370 comm="tee" name="fd" dev="proc" ino=26084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.167000 audit[3370]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd99665993 a2=241 a3=1b6 items=1 ppid=3290 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.167000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:48:25.167000 audit: PATH item=0 name="/dev/fd/63" inode=25115 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.175407 env[1123]: time="2024-02-12T19:48:25.174206641Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:25.175407 env[1123]: time="2024-02-12T19:48:25.174235788Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:25.175407 env[1123]: time="2024-02-12T19:48:25.174245528Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:25.175407 env[1123]: time="2024-02-12T19:48:25.174336129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953 pid=3387 runtime=io.containerd.runc.v2 Feb 12 19:48:25.184983 systemd[1]: Started cri-containerd-f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953.scope. Feb 12 19:48:25.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.193004 systemd-networkd[1018]: cali133ba58b9b8: Link UP Feb 12 19:48:25.194108 systemd-networkd[1018]: cali133ba58b9b8: Gained carrier Feb 12 19:48:25.194836 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali133ba58b9b8: link becomes ready Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.043 [INFO][3251] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.056 [INFO][3251] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--nvkq8-eth0 csi-node-driver- calico-system 902e07e6-2c2f-4c9d-9de4-300d08b5a396 771 0 2024-02-12 19:48:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-nvkq8 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali133ba58b9b8 [] []}} ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.056 [INFO][3251] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.085 [INFO][3267] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" HandleID="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.094 [INFO][3267] ipam_plugin.go 268: Auto assigning IP ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" HandleID="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000296830), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-nvkq8", "timestamp":"2024-02-12 19:48:25.085513004 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.094 [INFO][3267] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.106 [INFO][3267] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.106 [INFO][3267] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.109 [INFO][3267] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.139 [INFO][3267] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.151 [INFO][3267] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.155 [INFO][3267] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.160 [INFO][3267] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.160 [INFO][3267] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.164 [INFO][3267] ipam.go 1682: Creating new handle: k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.168 [INFO][3267] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.185 [INFO][3267] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.186 [INFO][3267] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" host="localhost" Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.186 [INFO][3267] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:25.207380 env[1123]: 2024-02-12 19:48:25.186 [INFO][3267] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" HandleID="k8s-pod-network.fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.207983 env[1123]: 2024-02-12 19:48:25.191 [INFO][3251] k8s.go 385: Populated endpoint ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nvkq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"902e07e6-2c2f-4c9d-9de4-300d08b5a396", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-nvkq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali133ba58b9b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:25.207983 env[1123]: 2024-02-12 19:48:25.191 [INFO][3251] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.207983 env[1123]: 2024-02-12 19:48:25.191 [INFO][3251] dataplane_linux.go 68: Setting the host side veth name to cali133ba58b9b8 ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.207983 env[1123]: 2024-02-12 19:48:25.194 [INFO][3251] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.207983 env[1123]: 2024-02-12 19:48:25.195 [INFO][3251] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nvkq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"902e07e6-2c2f-4c9d-9de4-300d08b5a396", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b", Pod:"csi-node-driver-nvkq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali133ba58b9b8", MAC:"0a:89:8f:67:95:20", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:25.207983 env[1123]: 2024-02-12 19:48:25.204 [INFO][3251] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b" Namespace="calico-system" Pod="csi-node-driver-nvkq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit: BPF prog-id=142 op=LOAD Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3387 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366564396233303138306564616234386630383737326338616333 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3387 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366564396233303138306564616234386630383737326338616333 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit: BPF prog-id=143 op=LOAD Feb 12 19:48:25.210000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033d100 items=0 ppid=3387 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366564396233303138306564616234386630383737326338616333 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.210000 audit: BPF prog-id=144 op=LOAD Feb 12 19:48:25.210000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033d148 items=0 ppid=3387 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366564396233303138306564616234386630383737326338616333 Feb 12 19:48:25.210000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:48:25.211000 audit[3424]: AVC avc: denied { write } for pid=3424 comm="tee" name="fd" dev="proc" ino=24068 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.211000 audit[3424]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff83621994 a2=241 a3=1b6 items=1 ppid=3303 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.211000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:48:25.211000 audit: PATH item=0 name="/dev/fd/63" inode=26139 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.211000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.212000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.212000 audit: BPF prog-id=145 op=LOAD Feb 12 19:48:25.212000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033d558 items=0 ppid=3387 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366564396233303138306564616234386630383737326338616333 Feb 12 19:48:25.215510 systemd-resolved[1069]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:25.222000 audit[3376]: AVC avc: denied { write } for pid=3376 comm="tee" name="fd" dev="proc" ino=23424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:25.222000 audit[3376]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff30d99995 a2=241 a3=1b6 items=1 ppid=3300 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.222000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:48:25.222000 audit: PATH item=0 name="/dev/fd/63" inode=26078 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:25.222000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:25.228986 env[1123]: time="2024-02-12T19:48:25.228924257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:25.228986 env[1123]: time="2024-02-12T19:48:25.228962653Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:25.228986 env[1123]: time="2024-02-12T19:48:25.228975049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:25.229238 env[1123]: time="2024-02-12T19:48:25.229176990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b pid=3444 runtime=io.containerd.runc.v2 Feb 12 19:48:25.241914 systemd[1]: Started cri-containerd-fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b.scope. Feb 12 19:48:25.259535 env[1123]: time="2024-02-12T19:48:25.259491052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d88cd86-8xd4n,Uid:3d008a86-1d84-4dcc-aede-ea273decf925,Namespace:calico-system,Attempt:1,} returns sandbox id \"f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953\"" Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.259000 audit: BPF prog-id=146 op=LOAD Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3444 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646230643766313737356635616561323034303437666661323561 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3444 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646230643766313737356635616561323034303437666661323561 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit: BPF prog-id=147 op=LOAD Feb 12 19:48:25.260000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000202f60 items=0 ppid=3444 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646230643766313737356635616561323034303437666661323561 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit: BPF prog-id=148 op=LOAD Feb 12 19:48:25.260000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000202fa8 items=0 ppid=3444 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646230643766313737356635616561323034303437666661323561 Feb 12 19:48:25.260000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:48:25.260000 audit: BPF prog-id=147 op=UNLOAD Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.260000 audit: BPF prog-id=149 op=LOAD Feb 12 19:48:25.260000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002033b8 items=0 ppid=3444 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646230643766313737356635616561323034303437666661323561 Feb 12 19:48:25.265793 env[1123]: time="2024-02-12T19:48:25.261662734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:48:25.265572 systemd-resolved[1069]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:25.288026 env[1123]: time="2024-02-12T19:48:25.287979869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvkq8,Uid:902e07e6-2c2f-4c9d-9de4-300d08b5a396,Namespace:calico-system,Attempt:1,} returns sandbox id \"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b\"" Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.393000 audit: BPF prog-id=150 op=LOAD Feb 12 19:48:25.393000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebb424820 a2=70 a3=7fecc6a0a000 items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.393000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit: BPF prog-id=151 op=LOAD Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebb424820 a2=70 a3=6e items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffebb4247d0 a2=70 a3=7ffebb424820 items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit: BPF prog-id=152 op=LOAD Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffebb4247b0 a2=70 a3=7ffebb424820 items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit: BPF prog-id=152 op=UNLOAD Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebb424890 a2=70 a3=0 items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebb424880 a2=70 a3=0 items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffebb4248c0 a2=70 a3=0 items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.394000 audit: BPF prog-id=153 op=LOAD Feb 12 19:48:25.394000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffebb4247e0 a2=70 a3=ffffffff items=0 ppid=3299 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.394000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:25.402000 audit[3546]: AVC avc: denied { bpf } for pid=3546 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.402000 audit[3546]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2394b980 a2=70 a3=208 items=0 ppid=3299 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.402000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:25.402000 audit[3546]: AVC avc: denied { bpf } for pid=3546 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.402000 audit[3546]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2394b850 a2=70 a3=3 items=0 ppid=3299 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.402000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:25.409000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:48:25.458000 audit[3576]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:25.458000 audit[3576]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffca362d4b0 a2=0 a3=7ffca362d49c items=0 ppid=3299 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.458000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:25.460542 systemd[1]: run-netns-cni\x2d86298733\x2db808\x2df5af\x2d98a6\x2d99e35c324773.mount: Deactivated successfully. Feb 12 19:48:25.463000 audit[3575]: NETFILTER_CFG table=nat:98 family=2 entries=16 op=nft_register_chain pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:25.463000 audit[3575]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff798290e0 a2=0 a3=7fff798290cc items=0 ppid=3299 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.463000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:25.464000 audit[3574]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:25.464000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc4cae3d60 a2=0 a3=55f127fed000 items=0 ppid=3299 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.464000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:25.464000 audit[3577]: NETFILTER_CFG table=filter:100 family=2 entries=97 op=nft_register_chain pid=3577 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:25.464000 audit[3577]: SYSCALL arch=c000003e syscall=46 success=yes exit=52024 a0=3 a1=7ffcb3243590 a2=0 a3=563f46cba000 items=0 ppid=3299 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.464000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:25.811467 env[1123]: time="2024-02-12T19:48:25.811361054Z" level=info msg="StopPodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\"" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.846 [INFO][3599] k8s.go 578: Cleaning up netns ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.846 [INFO][3599] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" iface="eth0" netns="/var/run/netns/cni-447c8ece-364c-68cd-07c9-1167173d0d14" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.846 [INFO][3599] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" iface="eth0" netns="/var/run/netns/cni-447c8ece-364c-68cd-07c9-1167173d0d14" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.847 [INFO][3599] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" iface="eth0" netns="/var/run/netns/cni-447c8ece-364c-68cd-07c9-1167173d0d14" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.847 [INFO][3599] k8s.go 585: Releasing IP address(es) ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.847 [INFO][3599] utils.go 188: Calico CNI releasing IP address ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.862 [INFO][3607] ipam_plugin.go 415: Releasing address using handleID ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.862 [INFO][3607] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.862 [INFO][3607] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.868 [WARNING][3607] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.868 [INFO][3607] ipam_plugin.go 443: Releasing address using workloadID ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.869 [INFO][3607] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:25.872359 env[1123]: 2024-02-12 19:48:25.870 [INFO][3599] k8s.go 591: Teardown processing complete. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:25.872969 env[1123]: time="2024-02-12T19:48:25.872506055Z" level=info msg="TearDown network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" successfully" Feb 12 19:48:25.872969 env[1123]: time="2024-02-12T19:48:25.872532778Z" level=info msg="StopPodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" returns successfully" Feb 12 19:48:25.873160 kubelet[2003]: E0212 19:48:25.872834 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:25.874267 systemd[1]: run-netns-cni\x2d447c8ece\x2d364c\x2d68cd\x2d07c9\x2d1167173d0d14.mount: Deactivated successfully. Feb 12 19:48:25.874986 env[1123]: time="2024-02-12T19:48:25.874930029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jtdsf,Uid:6d7279c7-efea-491e-8c38-1ef05d7e0bea,Namespace:kube-system,Attempt:1,}" Feb 12 19:48:25.965161 systemd-networkd[1018]: calicddd1cdc2f0: Link UP Feb 12 19:48:25.966094 systemd-networkd[1018]: calicddd1cdc2f0: Gained carrier Feb 12 19:48:25.966807 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicddd1cdc2f0: link becomes ready Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.912 [INFO][3615] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--jtdsf-eth0 coredns-5dd5756b68- kube-system 6d7279c7-efea-491e-8c38-1ef05d7e0bea 788 0 2024-02-12 19:47:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-jtdsf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicddd1cdc2f0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.913 [INFO][3615] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.935 [INFO][3628] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" HandleID="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.944 [INFO][3628] ipam_plugin.go 268: Auto assigning IP ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" HandleID="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000d5a80), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-jtdsf", "timestamp":"2024-02-12 19:48:25.935935693 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.944 [INFO][3628] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.944 [INFO][3628] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.944 [INFO][3628] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.946 [INFO][3628] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.949 [INFO][3628] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.951 [INFO][3628] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.953 [INFO][3628] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.954 [INFO][3628] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.954 [INFO][3628] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.955 [INFO][3628] ipam.go 1682: Creating new handle: k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57 Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.957 [INFO][3628] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.961 [INFO][3628] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.961 [INFO][3628] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" host="localhost" Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.961 [INFO][3628] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:25.977189 env[1123]: 2024-02-12 19:48:25.961 [INFO][3628] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" HandleID="k8s-pod-network.5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.977727 env[1123]: 2024-02-12 19:48:25.963 [INFO][3615] k8s.go 385: Populated endpoint ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--jtdsf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6d7279c7-efea-491e-8c38-1ef05d7e0bea", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-jtdsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicddd1cdc2f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:25.977727 env[1123]: 2024-02-12 19:48:25.963 [INFO][3615] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.977727 env[1123]: 2024-02-12 19:48:25.963 [INFO][3615] dataplane_linux.go 68: Setting the host side veth name to calicddd1cdc2f0 ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.977727 env[1123]: 2024-02-12 19:48:25.966 [INFO][3615] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.977727 env[1123]: 2024-02-12 19:48:25.968 [INFO][3615] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--jtdsf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6d7279c7-efea-491e-8c38-1ef05d7e0bea", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57", Pod:"coredns-5dd5756b68-jtdsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicddd1cdc2f0", MAC:"d6:f6:b7:07:d1:6d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:25.977727 env[1123]: 2024-02-12 19:48:25.975 [INFO][3615] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57" Namespace="kube-system" Pod="coredns-5dd5756b68-jtdsf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:25.987229 env[1123]: time="2024-02-12T19:48:25.987149485Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:25.987418 env[1123]: time="2024-02-12T19:48:25.987195187Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:25.987418 env[1123]: time="2024-02-12T19:48:25.987205687Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:25.987418 env[1123]: time="2024-02-12T19:48:25.987369243Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57 pid=3657 runtime=io.containerd.runc.v2 Feb 12 19:48:25.993000 audit[3668]: NETFILTER_CFG table=filter:101 family=2 entries=44 op=nft_register_chain pid=3668 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:25.993000 audit[3668]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffc5b1d1ff0 a2=0 a3=7ffc5b1d1fdc items=0 ppid=3299 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.993000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:26.000401 systemd[1]: Started cri-containerd-5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57.scope. Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.010000 audit: BPF prog-id=154 op=LOAD Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3657 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363565346338366366336534376539613039386233653232636135 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3657 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363565346338366366336534376539613039386233653232636135 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit: BPF prog-id=155 op=LOAD Feb 12 19:48:26.011000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025e40 items=0 ppid=3657 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363565346338366366336534376539613039386233653232636135 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit: BPF prog-id=156 op=LOAD Feb 12 19:48:26.011000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025e88 items=0 ppid=3657 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363565346338366366336534376539613039386233653232636135 Feb 12 19:48:26.011000 audit: BPF prog-id=156 op=UNLOAD Feb 12 19:48:26.011000 audit: BPF prog-id=155 op=UNLOAD Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.011000 audit: BPF prog-id=157 op=LOAD Feb 12 19:48:26.011000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000368298 items=0 ppid=3657 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363565346338366366336534376539613039386233653232636135 Feb 12 19:48:26.014086 systemd-resolved[1069]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:26.033268 env[1123]: time="2024-02-12T19:48:26.033228236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jtdsf,Uid:6d7279c7-efea-491e-8c38-1ef05d7e0bea,Namespace:kube-system,Attempt:1,} returns sandbox id \"5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57\"" Feb 12 19:48:26.033966 kubelet[2003]: E0212 19:48:26.033947 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:26.035421 env[1123]: time="2024-02-12T19:48:26.035396177Z" level=info msg="CreateContainer within sandbox \"5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:48:26.052275 env[1123]: time="2024-02-12T19:48:26.052237648Z" level=info msg="CreateContainer within sandbox \"5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6e2168f4f091877c3c4a48a990f3d2fd3e8d5b66ec6e2b7e1bc1c21065428477\"" Feb 12 19:48:26.052702 env[1123]: time="2024-02-12T19:48:26.052659377Z" level=info msg="StartContainer for \"6e2168f4f091877c3c4a48a990f3d2fd3e8d5b66ec6e2b7e1bc1c21065428477\"" Feb 12 19:48:26.064494 systemd[1]: Started cri-containerd-6e2168f4f091877c3c4a48a990f3d2fd3e8d5b66ec6e2b7e1bc1c21065428477.scope. Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.073000 audit: BPF prog-id=158 op=LOAD Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3657 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323136386634663039313837376333633461343861393930663364 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3657 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323136386634663039313837376333633461343861393930663364 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit: BPF prog-id=159 op=LOAD Feb 12 19:48:26.074000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000390280 items=0 ppid=3657 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323136386634663039313837376333633461343861393930663364 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit: BPF prog-id=160 op=LOAD Feb 12 19:48:26.074000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003902c8 items=0 ppid=3657 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323136386634663039313837376333633461343861393930663364 Feb 12 19:48:26.074000 audit: BPF prog-id=160 op=UNLOAD Feb 12 19:48:26.074000 audit: BPF prog-id=159 op=UNLOAD Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.074000 audit: BPF prog-id=161 op=LOAD Feb 12 19:48:26.074000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003906d8 items=0 ppid=3657 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323136386634663039313837376333633461343861393930663364 Feb 12 19:48:26.088041 env[1123]: time="2024-02-12T19:48:26.087441585Z" level=info msg="StartContainer for \"6e2168f4f091877c3c4a48a990f3d2fd3e8d5b66ec6e2b7e1bc1c21065428477\" returns successfully" Feb 12 19:48:26.267975 systemd-networkd[1018]: cali4f950f8942f: Gained IPv6LL Feb 12 19:48:26.303794 systemd-networkd[1018]: vxlan.calico: Link UP Feb 12 19:48:26.303802 systemd-networkd[1018]: vxlan.calico: Gained carrier Feb 12 19:48:26.843956 systemd-networkd[1018]: cali133ba58b9b8: Gained IPv6LL Feb 12 19:48:26.916114 kubelet[2003]: E0212 19:48:26.916088 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:26.923895 kubelet[2003]: I0212 19:48:26.923731 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-jtdsf" podStartSLOduration=32.923688315 podCreationTimestamp="2024-02-12 19:47:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:26.923114214 +0000 UTC m=+47.203381835" watchObservedRunningTime="2024-02-12 19:48:26.923688315 +0000 UTC m=+47.203955926" Feb 12 19:48:26.934000 audit[3739]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=3739 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.934000 audit[3739]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdc9c03fe0 a2=0 a3=7ffdc9c03fcc items=0 ppid=2204 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.935000 audit[3739]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3739 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.935000 audit[3739]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffdc9c03fe0 a2=0 a3=31030 items=0 ppid=2204 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.949000 audit[3741]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=3741 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.949000 audit[3741]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffce2b05f40 a2=0 a3=7ffce2b05f2c items=0 ppid=2204 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.955000 audit[3741]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3741 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.955000 audit[3741]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffce2b05f40 a2=0 a3=7ffce2b05f2c items=0 ppid=2204 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:27.483960 systemd-networkd[1018]: calicddd1cdc2f0: Gained IPv6LL Feb 12 19:48:27.812296 env[1123]: time="2024-02-12T19:48:27.812183820Z" level=info msg="StopPodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\"" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.856 [INFO][3761] k8s.go 578: Cleaning up netns ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.857 [INFO][3761] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" iface="eth0" netns="/var/run/netns/cni-d5d44aad-7f75-f479-daac-6cae8818dbba" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.858 [INFO][3761] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" iface="eth0" netns="/var/run/netns/cni-d5d44aad-7f75-f479-daac-6cae8818dbba" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.858 [INFO][3761] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" iface="eth0" netns="/var/run/netns/cni-d5d44aad-7f75-f479-daac-6cae8818dbba" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.858 [INFO][3761] k8s.go 585: Releasing IP address(es) ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.858 [INFO][3761] utils.go 188: Calico CNI releasing IP address ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.886 [INFO][3768] ipam_plugin.go 415: Releasing address using handleID ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.886 [INFO][3768] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.886 [INFO][3768] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.893 [WARNING][3768] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.893 [INFO][3768] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.894 [INFO][3768] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:27.898176 env[1123]: 2024-02-12 19:48:27.896 [INFO][3761] k8s.go 591: Teardown processing complete. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:27.899185 env[1123]: time="2024-02-12T19:48:27.898305678Z" level=info msg="TearDown network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" successfully" Feb 12 19:48:27.899185 env[1123]: time="2024-02-12T19:48:27.898333193Z" level=info msg="StopPodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" returns successfully" Feb 12 19:48:27.900093 systemd[1]: run-netns-cni\x2dd5d44aad\x2d7f75\x2df479\x2ddaac\x2d6cae8818dbba.mount: Deactivated successfully. Feb 12 19:48:27.900855 kubelet[2003]: E0212 19:48:27.900821 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:27.901448 env[1123]: time="2024-02-12T19:48:27.901408033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wkx66,Uid:506f33e4-3d3f-4a50-a96b-ea5d9882a996,Namespace:kube-system,Attempt:1,}" Feb 12 19:48:27.917989 kubelet[2003]: E0212 19:48:27.917953 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:27.931865 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL Feb 12 19:48:28.099398 systemd-networkd[1018]: calidcd85a811f5: Link UP Feb 12 19:48:28.101344 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:28.101398 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidcd85a811f5: link becomes ready Feb 12 19:48:28.101495 systemd-networkd[1018]: calidcd85a811f5: Gained carrier Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.047 [INFO][3781] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--wkx66-eth0 coredns-5dd5756b68- kube-system 506f33e4-3d3f-4a50-a96b-ea5d9882a996 812 0 2024-02-12 19:47:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-wkx66 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calidcd85a811f5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.047 [INFO][3781] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.070 [INFO][3790] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" HandleID="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.078 [INFO][3790] ipam_plugin.go 268: Auto assigning IP ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" HandleID="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012dba0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-wkx66", "timestamp":"2024-02-12 19:48:28.070872188 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.078 [INFO][3790] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.078 [INFO][3790] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.078 [INFO][3790] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.079 [INFO][3790] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.082 [INFO][3790] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.085 [INFO][3790] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.086 [INFO][3790] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.088 [INFO][3790] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.088 [INFO][3790] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.089 [INFO][3790] ipam.go 1682: Creating new handle: k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1 Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.092 [INFO][3790] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.095 [INFO][3790] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.095 [INFO][3790] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" host="localhost" Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.096 [INFO][3790] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:28.114166 env[1123]: 2024-02-12 19:48:28.096 [INFO][3790] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" HandleID="k8s-pod-network.daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.114715 env[1123]: 2024-02-12 19:48:28.097 [INFO][3781] k8s.go 385: Populated endpoint ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--wkx66-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"506f33e4-3d3f-4a50-a96b-ea5d9882a996", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-wkx66", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidcd85a811f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:28.114715 env[1123]: 2024-02-12 19:48:28.097 [INFO][3781] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.114715 env[1123]: 2024-02-12 19:48:28.097 [INFO][3781] dataplane_linux.go 68: Setting the host side veth name to calidcd85a811f5 ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.114715 env[1123]: 2024-02-12 19:48:28.101 [INFO][3781] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.114715 env[1123]: 2024-02-12 19:48:28.102 [INFO][3781] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--wkx66-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"506f33e4-3d3f-4a50-a96b-ea5d9882a996", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1", Pod:"coredns-5dd5756b68-wkx66", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidcd85a811f5", MAC:"12:91:a8:4c:de:58", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:28.114715 env[1123]: 2024-02-12 19:48:28.108 [INFO][3781] k8s.go 491: Wrote updated endpoint to datastore ContainerID="daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1" Namespace="kube-system" Pod="coredns-5dd5756b68-wkx66" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:28.118000 audit[3807]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=3807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:28.120001 kernel: kauditd_printk_skb: 411 callbacks suppressed Feb 12 19:48:28.120048 kernel: audit: type=1325 audit(1707767308.118:1266): table=filter:106 family=2 entries=38 op=nft_register_chain pid=3807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:28.118000 audit[3807]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffe9361da90 a2=0 a3=7ffe9361da7c items=0 ppid=3299 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.124660 kernel: audit: type=1300 audit(1707767308.118:1266): arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffe9361da90 a2=0 a3=7ffe9361da7c items=0 ppid=3299 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.124695 kernel: audit: type=1327 audit(1707767308.118:1266): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:28.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:28.133541 env[1123]: time="2024-02-12T19:48:28.133494812Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:28.133640 env[1123]: time="2024-02-12T19:48:28.133530443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:28.133640 env[1123]: time="2024-02-12T19:48:28.133540863Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:28.133726 env[1123]: time="2024-02-12T19:48:28.133646844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1 pid=3821 runtime=io.containerd.runc.v2 Feb 12 19:48:28.148041 systemd[1]: Started cri-containerd-daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1.scope. Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.163239 kernel: audit: type=1400 audit(1707767308.158:1267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.163285 kernel: audit: type=1400 audit(1707767308.158:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.163308 kernel: audit: type=1400 audit(1707767308.158:1269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.167277 kernel: audit: type=1400 audit(1707767308.158:1270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.168099 kernel: audit: type=1400 audit(1707767308.158:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.172004 kernel: audit: type=1400 audit(1707767308.158:1272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.172079 kernel: audit: type=1400 audit(1707767308.158:1273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit: BPF prog-id=162 op=LOAD Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3821 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663663393061656330303566366336623732366562613530653332 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3821 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663663393061656330303566366336623732366562613530653332 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.164000 audit: BPF prog-id=163 op=LOAD Feb 12 19:48:28.164000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000269ce0 items=0 ppid=3821 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663663393061656330303566366336623732366562613530653332 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit: BPF prog-id=164 op=LOAD Feb 12 19:48:28.166000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000269d28 items=0 ppid=3821 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663663393061656330303566366336623732366562613530653332 Feb 12 19:48:28.166000 audit: BPF prog-id=164 op=UNLOAD Feb 12 19:48:28.166000 audit: BPF prog-id=163 op=UNLOAD Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.166000 audit: BPF prog-id=165 op=LOAD Feb 12 19:48:28.166000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ea138 items=0 ppid=3821 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663663393061656330303566366336623732366562613530653332 Feb 12 19:48:28.174236 systemd-resolved[1069]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:28.195311 env[1123]: time="2024-02-12T19:48:28.195246908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wkx66,Uid:506f33e4-3d3f-4a50-a96b-ea5d9882a996,Namespace:kube-system,Attempt:1,} returns sandbox id \"daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1\"" Feb 12 19:48:28.195908 kubelet[2003]: E0212 19:48:28.195883 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:28.199319 env[1123]: time="2024-02-12T19:48:28.197753935Z" level=info msg="CreateContainer within sandbox \"daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:48:28.267892 env[1123]: time="2024-02-12T19:48:28.267839414Z" level=info msg="CreateContainer within sandbox \"daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1fcbe26fdc5f31a6f986a141840eb8d47ddcaa2b7431e5e8dbcab872cad634d3\"" Feb 12 19:48:28.268336 env[1123]: time="2024-02-12T19:48:28.268316160Z" level=info msg="StartContainer for \"1fcbe26fdc5f31a6f986a141840eb8d47ddcaa2b7431e5e8dbcab872cad634d3\"" Feb 12 19:48:28.282089 systemd[1]: Started cri-containerd-1fcbe26fdc5f31a6f986a141840eb8d47ddcaa2b7431e5e8dbcab872cad634d3.scope. Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.290000 audit: BPF prog-id=166 op=LOAD Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3821 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636265323666646335663331613666393836613134313834306562 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3821 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636265323666646335663331613666393836613134313834306562 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit: BPF prog-id=167 op=LOAD Feb 12 19:48:28.291000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026bde0 items=0 ppid=3821 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636265323666646335663331613666393836613134313834306562 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit: BPF prog-id=168 op=LOAD Feb 12 19:48:28.291000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026be28 items=0 ppid=3821 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636265323666646335663331613666393836613134313834306562 Feb 12 19:48:28.291000 audit: BPF prog-id=168 op=UNLOAD Feb 12 19:48:28.291000 audit: BPF prog-id=167 op=UNLOAD Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.291000 audit: BPF prog-id=169 op=LOAD Feb 12 19:48:28.291000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032e238 items=0 ppid=3821 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636265323666646335663331613666393836613134313834306562 Feb 12 19:48:28.303598 env[1123]: time="2024-02-12T19:48:28.302976496Z" level=info msg="StartContainer for \"1fcbe26fdc5f31a6f986a141840eb8d47ddcaa2b7431e5e8dbcab872cad634d3\" returns successfully" Feb 12 19:48:28.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.138:22-10.0.0.1:40196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:28.600347 systemd[1]: Started sshd@10-10.0.0.138:22-10.0.0.1:40196.service. Feb 12 19:48:28.771266 env[1123]: time="2024-02-12T19:48:28.771218167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:28.772951 env[1123]: time="2024-02-12T19:48:28.772908322Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:28.774499 env[1123]: time="2024-02-12T19:48:28.774460533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:28.776147 env[1123]: time="2024-02-12T19:48:28.776108194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:28.776811 env[1123]: time="2024-02-12T19:48:28.776778114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 19:48:28.777548 env[1123]: time="2024-02-12T19:48:28.777517582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:48:28.784122 env[1123]: time="2024-02-12T19:48:28.784094418Z" level=info msg="CreateContainer within sandbox \"f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:48:28.794445 env[1123]: time="2024-02-12T19:48:28.794407671Z" level=info msg="CreateContainer within sandbox \"f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"473a6ba62143975cfab789a8bc7a0c9c13270241ad7287d68afdf1796b1436d2\"" Feb 12 19:48:28.794808 env[1123]: time="2024-02-12T19:48:28.794743327Z" level=info msg="StartContainer for \"473a6ba62143975cfab789a8bc7a0c9c13270241ad7287d68afdf1796b1436d2\"" Feb 12 19:48:28.808446 systemd[1]: Started cri-containerd-473a6ba62143975cfab789a8bc7a0c9c13270241ad7287d68afdf1796b1436d2.scope. Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit: BPF prog-id=170 op=LOAD Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3387 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437336136626136323134333937356366616237383961386263376130 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3387 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437336136626136323134333937356366616237383961386263376130 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.819000 audit: BPF prog-id=171 op=LOAD Feb 12 19:48:28.819000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000b8cf0 items=0 ppid=3387 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437336136626136323134333937356366616237383961386263376130 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit: BPF prog-id=172 op=LOAD Feb 12 19:48:28.820000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000b8d38 items=0 ppid=3387 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437336136626136323134333937356366616237383961386263376130 Feb 12 19:48:28.820000 audit: BPF prog-id=172 op=UNLOAD Feb 12 19:48:28.820000 audit: BPF prog-id=171 op=UNLOAD Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:28.820000 audit: BPF prog-id=173 op=LOAD Feb 12 19:48:28.820000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000b9148 items=0 ppid=3387 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437336136626136323134333937356366616237383961386263376130 Feb 12 19:48:28.829000 audit[3894]: USER_ACCT pid=3894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:28.830791 sshd[3894]: Accepted publickey for core from 10.0.0.1 port 40196 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:28.831000 audit[3894]: CRED_ACQ pid=3894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:28.831000 audit[3894]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffca9ce570 a2=3 a3=0 items=0 ppid=1 pid=3894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:28.832426 sshd[3894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:28.836754 systemd[1]: Started session-11.scope. Feb 12 19:48:28.837933 systemd-logind[1110]: New session 11 of user core. Feb 12 19:48:28.841000 audit[3894]: USER_START pid=3894 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:28.844000 audit[3929]: CRED_ACQ pid=3929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:28.845612 env[1123]: time="2024-02-12T19:48:28.845480157Z" level=info msg="StartContainer for \"473a6ba62143975cfab789a8bc7a0c9c13270241ad7287d68afdf1796b1436d2\" returns successfully" Feb 12 19:48:28.902629 systemd[1]: run-containerd-runc-k8s.io-daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1-runc.nzNTki.mount: Deactivated successfully. Feb 12 19:48:28.925945 kubelet[2003]: E0212 19:48:28.924567 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:28.925945 kubelet[2003]: E0212 19:48:28.925067 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:28.946434 kubelet[2003]: I0212 19:48:28.946394 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-77d88cd86-8xd4n" podStartSLOduration=25.430653221 podCreationTimestamp="2024-02-12 19:48:00 +0000 UTC" firstStartedPulling="2024-02-12 19:48:25.261350693 +0000 UTC m=+45.541618294" lastFinishedPulling="2024-02-12 19:48:28.777058 +0000 UTC m=+49.057325601" observedRunningTime="2024-02-12 19:48:28.937475439 +0000 UTC m=+49.217743090" watchObservedRunningTime="2024-02-12 19:48:28.946360528 +0000 UTC m=+49.226628129" Feb 12 19:48:28.946605 kubelet[2003]: I0212 19:48:28.946459 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-wkx66" podStartSLOduration=34.946444314 podCreationTimestamp="2024-02-12 19:47:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:28.945686018 +0000 UTC m=+49.225953639" watchObservedRunningTime="2024-02-12 19:48:28.946444314 +0000 UTC m=+49.226711915" Feb 12 19:48:28.956000 audit[3960]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.956000 audit[3960]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffee4f2780 a2=0 a3=7fffee4f276c items=0 ppid=2204 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.963000 audit[3960]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.963000 audit[3960]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fffee4f2780 a2=0 a3=7fffee4f276c items=0 ppid=2204 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.997700 sshd[3894]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:28.997000 audit[3894]: USER_END pid=3894 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:28.998000 audit[3894]: CRED_DISP pid=3894 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.138:22-10.0.0.1:40200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.000711 systemd[1]: Started sshd@11-10.0.0.138:22-10.0.0.1:40200.service. Feb 12 19:48:29.008312 systemd[1]: sshd@10-10.0.0.138:22-10.0.0.1:40196.service: Deactivated successfully. Feb 12 19:48:29.009133 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:48:29.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.138:22-10.0.0.1:40196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.009831 systemd-logind[1110]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:48:29.010550 systemd-logind[1110]: Removed session 11. Feb 12 19:48:29.031000 audit[3968]: USER_ACCT pid=3968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.032321 sshd[3968]: Accepted publickey for core from 10.0.0.1 port 40200 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:29.032000 audit[3968]: CRED_ACQ pid=3968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.032000 audit[3968]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb6e4feb0 a2=3 a3=0 items=0 ppid=1 pid=3968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:29.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:29.033265 sshd[3968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:29.037395 systemd[1]: Started session-12.scope. Feb 12 19:48:29.038726 systemd-logind[1110]: New session 12 of user core. Feb 12 19:48:29.042000 audit[3968]: USER_START pid=3968 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.044000 audit[3971]: CRED_ACQ pid=3971 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.336016 sshd[3968]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:29.338015 systemd[1]: Started sshd@12-10.0.0.138:22-10.0.0.1:40216.service. Feb 12 19:48:29.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.138:22-10.0.0.1:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.340000 audit[3968]: USER_END pid=3968 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.340000 audit[3968]: CRED_DISP pid=3968 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.342976 systemd-logind[1110]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:48:29.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.138:22-10.0.0.1:40200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.344663 systemd[1]: sshd@11-10.0.0.138:22-10.0.0.1:40200.service: Deactivated successfully. Feb 12 19:48:29.345369 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:48:29.346525 systemd-logind[1110]: Removed session 12. Feb 12 19:48:29.374000 audit[3980]: USER_ACCT pid=3980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.375468 sshd[3980]: Accepted publickey for core from 10.0.0.1 port 40216 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:29.375000 audit[3980]: CRED_ACQ pid=3980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.375000 audit[3980]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaff82c30 a2=3 a3=0 items=0 ppid=1 pid=3980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:29.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:29.376608 sshd[3980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:29.379799 systemd-logind[1110]: New session 13 of user core. Feb 12 19:48:29.380549 systemd[1]: Started session-13.scope. Feb 12 19:48:29.383000 audit[3980]: USER_START pid=3980 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.385000 audit[3983]: CRED_ACQ pid=3983 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.490197 sshd[3980]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:29.490000 audit[3980]: USER_END pid=3980 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.490000 audit[3980]: CRED_DISP pid=3980 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:29.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.138:22-10.0.0.1:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.492338 systemd[1]: sshd@12-10.0.0.138:22-10.0.0.1:40216.service: Deactivated successfully. Feb 12 19:48:29.493051 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:48:29.493640 systemd-logind[1110]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:48:29.494443 systemd-logind[1110]: Removed session 13. Feb 12 19:48:29.595962 systemd-networkd[1018]: calidcd85a811f5: Gained IPv6LL Feb 12 19:48:29.926263 kubelet[2003]: E0212 19:48:29.926239 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:30.604797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount613826942.mount: Deactivated successfully. Feb 12 19:48:30.928036 kubelet[2003]: E0212 19:48:30.928017 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:31.210744 env[1123]: time="2024-02-12T19:48:31.210620301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.212378 env[1123]: time="2024-02-12T19:48:31.212337423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.218794 env[1123]: time="2024-02-12T19:48:31.218738260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.220115 env[1123]: time="2024-02-12T19:48:31.220068926Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.220662 env[1123]: time="2024-02-12T19:48:31.220636380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:48:31.222126 env[1123]: time="2024-02-12T19:48:31.222099708Z" level=info msg="CreateContainer within sandbox \"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:48:31.241855 env[1123]: time="2024-02-12T19:48:31.241817172Z" level=info msg="CreateContainer within sandbox \"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"bb08926f0267d45bad46361986648aeeaebc5437bcd063a8182772ddac241bca\"" Feb 12 19:48:31.242701 env[1123]: time="2024-02-12T19:48:31.242673338Z" level=info msg="StartContainer for \"bb08926f0267d45bad46361986648aeeaebc5437bcd063a8182772ddac241bca\"" Feb 12 19:48:31.256560 systemd[1]: Started cri-containerd-bb08926f0267d45bad46361986648aeeaebc5437bcd063a8182772ddac241bca.scope. Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fae3547e5a8 items=0 ppid=3444 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303839323666303236376434356261643436333631393836363438 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit: BPF prog-id=174 op=LOAD Feb 12 19:48:31.268000 audit[4006]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000273ba8 items=0 ppid=3444 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303839323666303236376434356261643436333631393836363438 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.268000 audit: BPF prog-id=175 op=LOAD Feb 12 19:48:31.268000 audit[4006]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000273bf8 items=0 ppid=3444 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303839323666303236376434356261643436333631393836363438 Feb 12 19:48:31.269000 audit: BPF prog-id=175 op=UNLOAD Feb 12 19:48:31.269000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.269000 audit: BPF prog-id=176 op=LOAD Feb 12 19:48:31.269000 audit[4006]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000273c88 items=0 ppid=3444 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303839323666303236376434356261643436333631393836363438 Feb 12 19:48:31.280162 env[1123]: time="2024-02-12T19:48:31.280116070Z" level=info msg="StartContainer for \"bb08926f0267d45bad46361986648aeeaebc5437bcd063a8182772ddac241bca\" returns successfully" Feb 12 19:48:31.281650 env[1123]: time="2024-02-12T19:48:31.281605320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:48:33.054524 env[1123]: time="2024-02-12T19:48:33.054425525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.056369 env[1123]: time="2024-02-12T19:48:33.056337478Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.058184 env[1123]: time="2024-02-12T19:48:33.058144101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.059885 env[1123]: time="2024-02-12T19:48:33.059856398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.060089 env[1123]: time="2024-02-12T19:48:33.060058979Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:48:33.062573 env[1123]: time="2024-02-12T19:48:33.062530469Z" level=info msg="CreateContainer within sandbox \"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:48:33.075452 env[1123]: time="2024-02-12T19:48:33.075405236Z" level=info msg="CreateContainer within sandbox \"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3f6d945d3574c89f7893e02ecb0e5e839e0e4b92878dc52fcdfef5dbd89962c3\"" Feb 12 19:48:33.075968 env[1123]: time="2024-02-12T19:48:33.075933782Z" level=info msg="StartContainer for \"3f6d945d3574c89f7893e02ecb0e5e839e0e4b92878dc52fcdfef5dbd89962c3\"" Feb 12 19:48:33.093034 systemd[1]: run-containerd-runc-k8s.io-3f6d945d3574c89f7893e02ecb0e5e839e0e4b92878dc52fcdfef5dbd89962c3-runc.lN69nt.mount: Deactivated successfully. Feb 12 19:48:33.094366 systemd[1]: Started cri-containerd-3f6d945d3574c89f7893e02ecb0e5e839e0e4b92878dc52fcdfef5dbd89962c3.scope. Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fc6a01f62f8 items=0 ppid=3444 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366439343564333537346338396637383933653032656362306535 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit: BPF prog-id=177 op=LOAD Feb 12 19:48:33.105000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000024da8 items=0 ppid=3444 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366439343564333537346338396637383933653032656362306535 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit: BPF prog-id=178 op=LOAD Feb 12 19:48:33.105000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000024df8 items=0 ppid=3444 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366439343564333537346338396637383933653032656362306535 Feb 12 19:48:33.105000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:48:33.105000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.105000 audit: BPF prog-id=179 op=LOAD Feb 12 19:48:33.105000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000024e88 items=0 ppid=3444 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366439343564333537346338396637383933653032656362306535 Feb 12 19:48:33.117588 env[1123]: time="2024-02-12T19:48:33.117544846Z" level=info msg="StartContainer for \"3f6d945d3574c89f7893e02ecb0e5e839e0e4b92878dc52fcdfef5dbd89962c3\" returns successfully" Feb 12 19:48:33.875467 kubelet[2003]: I0212 19:48:33.875433 2003 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:48:33.875850 kubelet[2003]: I0212 19:48:33.875524 2003 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:48:33.947785 kubelet[2003]: I0212 19:48:33.947731 2003 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-nvkq8" podStartSLOduration=26.176416147 podCreationTimestamp="2024-02-12 19:48:00 +0000 UTC" firstStartedPulling="2024-02-12 19:48:25.288998447 +0000 UTC m=+45.569266058" lastFinishedPulling="2024-02-12 19:48:33.060278924 +0000 UTC m=+53.340546535" observedRunningTime="2024-02-12 19:48:33.947255381 +0000 UTC m=+54.227522992" watchObservedRunningTime="2024-02-12 19:48:33.947696624 +0000 UTC m=+54.227964235" Feb 12 19:48:34.494645 systemd[1]: Started sshd@13-10.0.0.138:22-10.0.0.1:40218.service. Feb 12 19:48:34.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.138:22-10.0.0.1:40218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:34.498195 kernel: kauditd_printk_skb: 289 callbacks suppressed Feb 12 19:48:34.498249 kernel: audit: type=1130 audit(1707767314.492:1362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.138:22-10.0.0.1:40218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:34.526000 audit[4078]: USER_ACCT pid=4078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.528451 sshd[4078]: Accepted publickey for core from 10.0.0.1 port 40218 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:34.533859 kernel: audit: type=1101 audit(1707767314.526:1363): pid=4078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.533906 kernel: audit: type=1103 audit(1707767314.529:1364): pid=4078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.529000 audit[4078]: CRED_ACQ pid=4078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.531699 sshd[4078]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:34.535974 kernel: audit: type=1006 audit(1707767314.529:1365): pid=4078 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 19:48:34.535817 systemd[1]: Started session-14.scope. Feb 12 19:48:34.529000 audit[4078]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea8770760 a2=3 a3=0 items=0 ppid=1 pid=4078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:34.537043 systemd-logind[1110]: New session 14 of user core. Feb 12 19:48:34.539179 kernel: audit: type=1300 audit(1707767314.529:1365): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea8770760 a2=3 a3=0 items=0 ppid=1 pid=4078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:34.529000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:34.540255 kernel: audit: type=1327 audit(1707767314.529:1365): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:34.540000 audit[4078]: USER_START pid=4078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.541000 audit[4080]: CRED_ACQ pid=4080 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.547305 kernel: audit: type=1105 audit(1707767314.540:1366): pid=4078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.547346 kernel: audit: type=1103 audit(1707767314.541:1367): pid=4080 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.641261 sshd[4078]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:34.640000 audit[4078]: USER_END pid=4078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.640000 audit[4078]: CRED_DISP pid=4078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.643481 systemd[1]: sshd@13-10.0.0.138:22-10.0.0.1:40218.service: Deactivated successfully. Feb 12 19:48:34.644197 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:48:34.644755 systemd-logind[1110]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:48:34.645534 systemd-logind[1110]: Removed session 14. Feb 12 19:48:34.647750 kernel: audit: type=1106 audit(1707767314.640:1368): pid=4078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.647864 kernel: audit: type=1104 audit(1707767314.640:1369): pid=4078 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:34.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.138:22-10.0.0.1:40218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:36.709000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.709000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f19170 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:48:36.709000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:36.709000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.709000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000af4920 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:48:36.709000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:36.950000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.950000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.950000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.950000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c012b08e60 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:48:36.950000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c013e43740 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:48:36.950000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c01388f050 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:48:36.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:48:36.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:48:36.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:48:36.951000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.951000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c01335ce10 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:48:36.951000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:48:36.981000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.981000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0123545a0 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:48:36.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:48:36.981000 audit[1867]: AVC avc: denied { watch } for pid=1867 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:36.981000 audit[1867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c013e43830 a2=fc6 a3=0 items=0 ppid=1720 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c750,c965 key=(null) Feb 12 19:48:36.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:48:39.644980 systemd[1]: Started sshd@14-10.0.0.138:22-10.0.0.1:54310.service. Feb 12 19:48:39.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.138:22-10.0.0.1:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:39.645839 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:48:39.645885 kernel: audit: type=1130 audit(1707767319.644:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.138:22-10.0.0.1:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:39.674000 audit[4100]: USER_ACCT pid=4100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.675536 sshd[4100]: Accepted publickey for core from 10.0.0.1 port 54310 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:39.677000 audit[4100]: CRED_ACQ pid=4100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.678406 sshd[4100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:39.680589 kernel: audit: type=1101 audit(1707767319.674:1380): pid=4100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.680636 kernel: audit: type=1103 audit(1707767319.677:1381): pid=4100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.680652 kernel: audit: type=1006 audit(1707767319.677:1382): pid=4100 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:48:39.681436 systemd-logind[1110]: New session 15 of user core. Feb 12 19:48:39.681946 systemd[1]: Started session-15.scope. Feb 12 19:48:39.682226 kernel: audit: type=1300 audit(1707767319.677:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea7a301d0 a2=3 a3=0 items=0 ppid=1 pid=4100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.677000 audit[4100]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea7a301d0 a2=3 a3=0 items=0 ppid=1 pid=4100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:39.685928 kernel: audit: type=1327 audit(1707767319.677:1382): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:39.686026 kernel: audit: type=1105 audit(1707767319.685:1383): pid=4100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.685000 audit[4100]: USER_START pid=4100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.686000 audit[4102]: CRED_ACQ pid=4102 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.691172 kernel: audit: type=1103 audit(1707767319.686:1384): pid=4102 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.783825 sshd[4100]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:39.783000 audit[4100]: USER_END pid=4100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.785812 systemd[1]: sshd@14-10.0.0.138:22-10.0.0.1:54310.service: Deactivated successfully. Feb 12 19:48:39.786485 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:48:39.787225 systemd-logind[1110]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:48:39.783000 audit[4100]: CRED_DISP pid=4100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.787942 systemd-logind[1110]: Removed session 15. Feb 12 19:48:39.789873 kernel: audit: type=1106 audit(1707767319.783:1385): pid=4100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.789933 kernel: audit: type=1104 audit(1707767319.783:1386): pid=4100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:39.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.138:22-10.0.0.1:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:39.793498 env[1123]: time="2024-02-12T19:48:39.793458787Z" level=info msg="StopPodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\"" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.823 [WARNING][4128] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nvkq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"902e07e6-2c2f-4c9d-9de4-300d08b5a396", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b", Pod:"csi-node-driver-nvkq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali133ba58b9b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.823 [INFO][4128] k8s.go 578: Cleaning up netns ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.823 [INFO][4128] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" iface="eth0" netns="" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.823 [INFO][4128] k8s.go 585: Releasing IP address(es) ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.823 [INFO][4128] utils.go 188: Calico CNI releasing IP address ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.840 [INFO][4138] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.840 [INFO][4138] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.840 [INFO][4138] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.846 [WARNING][4138] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.847 [INFO][4138] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.848 [INFO][4138] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:39.851401 env[1123]: 2024-02-12 19:48:39.850 [INFO][4128] k8s.go 591: Teardown processing complete. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.851401 env[1123]: time="2024-02-12T19:48:39.851384133Z" level=info msg="TearDown network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" successfully" Feb 12 19:48:39.851962 env[1123]: time="2024-02-12T19:48:39.851415265Z" level=info msg="StopPodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" returns successfully" Feb 12 19:48:39.851962 env[1123]: time="2024-02-12T19:48:39.851895652Z" level=info msg="RemovePodSandbox for \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\"" Feb 12 19:48:39.851962 env[1123]: time="2024-02-12T19:48:39.851936051Z" level=info msg="Forcibly stopping sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\"" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.880 [WARNING][4160] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nvkq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"902e07e6-2c2f-4c9d-9de4-300d08b5a396", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fedb0d7f1775f5aea204047ffa25a9c50e5636abceca3694fa03fe1bc1675d6b", Pod:"csi-node-driver-nvkq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali133ba58b9b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.880 [INFO][4160] k8s.go 578: Cleaning up netns ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.880 [INFO][4160] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" iface="eth0" netns="" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.880 [INFO][4160] k8s.go 585: Releasing IP address(es) ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.880 [INFO][4160] utils.go 188: Calico CNI releasing IP address ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.897 [INFO][4167] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.897 [INFO][4167] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.897 [INFO][4167] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.904 [WARNING][4167] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.904 [INFO][4167] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" HandleID="k8s-pod-network.dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Workload="localhost-k8s-csi--node--driver--nvkq8-eth0" Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.905 [INFO][4167] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:39.908616 env[1123]: 2024-02-12 19:48:39.907 [INFO][4160] k8s.go 591: Teardown processing complete. ContainerID="dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15" Feb 12 19:48:39.908616 env[1123]: time="2024-02-12T19:48:39.908573297Z" level=info msg="TearDown network for sandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" successfully" Feb 12 19:48:39.917364 env[1123]: time="2024-02-12T19:48:39.917316070Z" level=info msg="RemovePodSandbox \"dc814633fd6b1fe08a42b7a40e5f5a5715f3d09025e47430be164adb1e1abb15\" returns successfully" Feb 12 19:48:39.917824 env[1123]: time="2024-02-12T19:48:39.917789665Z" level=info msg="StopPodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\"" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.950 [WARNING][4191] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--wkx66-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"506f33e4-3d3f-4a50-a96b-ea5d9882a996", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1", Pod:"coredns-5dd5756b68-wkx66", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidcd85a811f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.950 [INFO][4191] k8s.go 578: Cleaning up netns ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.950 [INFO][4191] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" iface="eth0" netns="" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.950 [INFO][4191] k8s.go 585: Releasing IP address(es) ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.950 [INFO][4191] utils.go 188: Calico CNI releasing IP address ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.966 [INFO][4199] ipam_plugin.go 415: Releasing address using handleID ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.966 [INFO][4199] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.966 [INFO][4199] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.973 [WARNING][4199] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.973 [INFO][4199] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.974 [INFO][4199] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:39.977180 env[1123]: 2024-02-12 19:48:39.975 [INFO][4191] k8s.go 591: Teardown processing complete. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:39.977621 env[1123]: time="2024-02-12T19:48:39.977236841Z" level=info msg="TearDown network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" successfully" Feb 12 19:48:39.977621 env[1123]: time="2024-02-12T19:48:39.977266300Z" level=info msg="StopPodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" returns successfully" Feb 12 19:48:39.977668 env[1123]: time="2024-02-12T19:48:39.977636880Z" level=info msg="RemovePodSandbox for \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\"" Feb 12 19:48:39.977695 env[1123]: time="2024-02-12T19:48:39.977659234Z" level=info msg="Forcibly stopping sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\"" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.005 [WARNING][4222] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--wkx66-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"506f33e4-3d3f-4a50-a96b-ea5d9882a996", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"daf6c90aec005f6c6b726eba50e32cfea46f95eadb6521e496e450c1baa479d1", Pod:"coredns-5dd5756b68-wkx66", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidcd85a811f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.005 [INFO][4222] k8s.go 578: Cleaning up netns ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.005 [INFO][4222] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" iface="eth0" netns="" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.005 [INFO][4222] k8s.go 585: Releasing IP address(es) ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.005 [INFO][4222] utils.go 188: Calico CNI releasing IP address ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.022 [INFO][4230] ipam_plugin.go 415: Releasing address using handleID ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.022 [INFO][4230] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.022 [INFO][4230] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.028 [WARNING][4230] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.028 [INFO][4230] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" HandleID="k8s-pod-network.6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Workload="localhost-k8s-coredns--5dd5756b68--wkx66-eth0" Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.029 [INFO][4230] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:40.032745 env[1123]: 2024-02-12 19:48:40.031 [INFO][4222] k8s.go 591: Teardown processing complete. ContainerID="6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2" Feb 12 19:48:40.033263 env[1123]: time="2024-02-12T19:48:40.032752170Z" level=info msg="TearDown network for sandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" successfully" Feb 12 19:48:40.035537 env[1123]: time="2024-02-12T19:48:40.035503494Z" level=info msg="RemovePodSandbox \"6076486a6bfbfba0366fefc5de113d983b875953f6d46a716735a07ce055d8a2\" returns successfully" Feb 12 19:48:40.036120 env[1123]: time="2024-02-12T19:48:40.036081463Z" level=info msg="StopPodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\"" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.062 [WARNING][4253] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0", GenerateName:"calico-kube-controllers-77d88cd86-", Namespace:"calico-system", SelfLink:"", UID:"3d008a86-1d84-4dcc-aede-ea273decf925", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d88cd86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953", Pod:"calico-kube-controllers-77d88cd86-8xd4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f950f8942f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.063 [INFO][4253] k8s.go 578: Cleaning up netns ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.063 [INFO][4253] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" iface="eth0" netns="" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.063 [INFO][4253] k8s.go 585: Releasing IP address(es) ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.063 [INFO][4253] utils.go 188: Calico CNI releasing IP address ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.080 [INFO][4261] ipam_plugin.go 415: Releasing address using handleID ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.080 [INFO][4261] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.080 [INFO][4261] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.086 [WARNING][4261] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.086 [INFO][4261] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.087 [INFO][4261] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:40.091118 env[1123]: 2024-02-12 19:48:40.089 [INFO][4253] k8s.go 591: Teardown processing complete. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.091537 env[1123]: time="2024-02-12T19:48:40.091126606Z" level=info msg="TearDown network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" successfully" Feb 12 19:48:40.091537 env[1123]: time="2024-02-12T19:48:40.091157918Z" level=info msg="StopPodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" returns successfully" Feb 12 19:48:40.091597 env[1123]: time="2024-02-12T19:48:40.091574238Z" level=info msg="RemovePodSandbox for \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\"" Feb 12 19:48:40.091636 env[1123]: time="2024-02-12T19:48:40.091602264Z" level=info msg="Forcibly stopping sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\"" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.120 [WARNING][4285] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0", GenerateName:"calico-kube-controllers-77d88cd86-", Namespace:"calico-system", SelfLink:"", UID:"3d008a86-1d84-4dcc-aede-ea273decf925", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d88cd86", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f86ed9b30180edab48f08772c8ac3d5349e0434468f0f6257a8dbd4d85102953", Pod:"calico-kube-controllers-77d88cd86-8xd4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f950f8942f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.120 [INFO][4285] k8s.go 578: Cleaning up netns ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.120 [INFO][4285] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" iface="eth0" netns="" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.120 [INFO][4285] k8s.go 585: Releasing IP address(es) ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.120 [INFO][4285] utils.go 188: Calico CNI releasing IP address ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.137 [INFO][4293] ipam_plugin.go 415: Releasing address using handleID ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.137 [INFO][4293] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.137 [INFO][4293] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.143 [WARNING][4293] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.143 [INFO][4293] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" HandleID="k8s-pod-network.d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Workload="localhost-k8s-calico--kube--controllers--77d88cd86--8xd4n-eth0" Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.144 [INFO][4293] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:40.146989 env[1123]: 2024-02-12 19:48:40.145 [INFO][4285] k8s.go 591: Teardown processing complete. ContainerID="d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd" Feb 12 19:48:40.147406 env[1123]: time="2024-02-12T19:48:40.147006293Z" level=info msg="TearDown network for sandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" successfully" Feb 12 19:48:40.149894 env[1123]: time="2024-02-12T19:48:40.149867895Z" level=info msg="RemovePodSandbox \"d87c7e917915930e37fd1d7b954c7491ee328d5d0c821b8cb4f933c6f10242fd\" returns successfully" Feb 12 19:48:40.150305 env[1123]: time="2024-02-12T19:48:40.150283525Z" level=info msg="StopPodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\"" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.179 [WARNING][4316] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--jtdsf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6d7279c7-efea-491e-8c38-1ef05d7e0bea", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57", Pod:"coredns-5dd5756b68-jtdsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicddd1cdc2f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.179 [INFO][4316] k8s.go 578: Cleaning up netns ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.179 [INFO][4316] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" iface="eth0" netns="" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.179 [INFO][4316] k8s.go 585: Releasing IP address(es) ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.179 [INFO][4316] utils.go 188: Calico CNI releasing IP address ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.195 [INFO][4325] ipam_plugin.go 415: Releasing address using handleID ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.196 [INFO][4325] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.196 [INFO][4325] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.204 [WARNING][4325] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.204 [INFO][4325] ipam_plugin.go 443: Releasing address using workloadID ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.205 [INFO][4325] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:40.208733 env[1123]: 2024-02-12 19:48:40.207 [INFO][4316] k8s.go 591: Teardown processing complete. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.208733 env[1123]: time="2024-02-12T19:48:40.208698341Z" level=info msg="TearDown network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" successfully" Feb 12 19:48:40.208733 env[1123]: time="2024-02-12T19:48:40.208728009Z" level=info msg="StopPodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" returns successfully" Feb 12 19:48:40.209984 env[1123]: time="2024-02-12T19:48:40.209952403Z" level=info msg="RemovePodSandbox for \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\"" Feb 12 19:48:40.210152 env[1123]: time="2024-02-12T19:48:40.209980929Z" level=info msg="Forcibly stopping sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\"" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.239 [WARNING][4347] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--jtdsf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6d7279c7-efea-491e-8c38-1ef05d7e0bea", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d65e4c86cf3e47e9a098b3e22ca5576fa7e6a2b5216843bdf2a818c1816ec57", Pod:"coredns-5dd5756b68-jtdsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicddd1cdc2f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.239 [INFO][4347] k8s.go 578: Cleaning up netns ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.239 [INFO][4347] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" iface="eth0" netns="" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.239 [INFO][4347] k8s.go 585: Releasing IP address(es) ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.239 [INFO][4347] utils.go 188: Calico CNI releasing IP address ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.259 [INFO][4355] ipam_plugin.go 415: Releasing address using handleID ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.259 [INFO][4355] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.259 [INFO][4355] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.264 [WARNING][4355] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.264 [INFO][4355] ipam_plugin.go 443: Releasing address using workloadID ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" HandleID="k8s-pod-network.286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Workload="localhost-k8s-coredns--5dd5756b68--jtdsf-eth0" Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.265 [INFO][4355] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:40.268462 env[1123]: 2024-02-12 19:48:40.267 [INFO][4347] k8s.go 591: Teardown processing complete. ContainerID="286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180" Feb 12 19:48:40.268928 env[1123]: time="2024-02-12T19:48:40.268472727Z" level=info msg="TearDown network for sandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" successfully" Feb 12 19:48:40.271244 env[1123]: time="2024-02-12T19:48:40.271214222Z" level=info msg="RemovePodSandbox \"286852e36755273868e9477e0e1c5c26e6873c0a4c5db46cd38bb7bff7af5180\" returns successfully" Feb 12 19:48:42.880000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:42.880000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0003a7e40 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:48:42.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:42.881000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:42.881000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000af5520 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:48:42.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:42.882000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:42.882000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002634800 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:48:42.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:42.882000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:42.882000 audit[1858]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000af5760 a2=fc6 a3=0 items=0 ppid=1702 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c348,c887 key=(null) Feb 12 19:48:42.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:44.787683 systemd[1]: Started sshd@15-10.0.0.138:22-10.0.0.1:54314.service. Feb 12 19:48:44.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.138:22-10.0.0.1:54314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:44.791111 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:48:44.791179 kernel: audit: type=1130 audit(1707767324.787:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.138:22-10.0.0.1:54314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:44.821000 audit[4383]: USER_ACCT pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.822415 sshd[4383]: Accepted publickey for core from 10.0.0.1 port 54314 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:44.824276 sshd[4383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:44.823000 audit[4383]: CRED_ACQ pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.827318 kernel: audit: type=1101 audit(1707767324.821:1393): pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.827370 kernel: audit: type=1103 audit(1707767324.823:1394): pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.827392 kernel: audit: type=1006 audit(1707767324.823:1395): pid=4383 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:48:44.827609 systemd-logind[1110]: New session 16 of user core. Feb 12 19:48:44.828394 systemd[1]: Started session-16.scope. Feb 12 19:48:44.828869 kernel: audit: type=1300 audit(1707767324.823:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe082b6a30 a2=3 a3=0 items=0 ppid=1 pid=4383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:44.823000 audit[4383]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe082b6a30 a2=3 a3=0 items=0 ppid=1 pid=4383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:44.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:44.832369 kernel: audit: type=1327 audit(1707767324.823:1395): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:44.831000 audit[4383]: USER_START pid=4383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.835474 kernel: audit: type=1105 audit(1707767324.831:1396): pid=4383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.835515 kernel: audit: type=1103 audit(1707767324.832:1397): pid=4385 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.832000 audit[4385]: CRED_ACQ pid=4385 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.931393 sshd[4383]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:44.931000 audit[4383]: USER_END pid=4383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.933599 systemd[1]: sshd@15-10.0.0.138:22-10.0.0.1:54314.service: Deactivated successfully. Feb 12 19:48:44.934286 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:48:44.937351 kernel: audit: type=1106 audit(1707767324.931:1398): pid=4383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.937450 kernel: audit: type=1104 audit(1707767324.931:1399): pid=4383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.931000 audit[4383]: CRED_DISP pid=4383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:44.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.138:22-10.0.0.1:54314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:44.937396 systemd-logind[1110]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:48:44.938015 systemd-logind[1110]: Removed session 16. Feb 12 19:48:48.631934 systemd[1]: run-containerd-runc-k8s.io-23ce687b1dd7aa4032efcca0069f05acb190767d0ff86782ba9028f5dedf2141-runc.gTVsKE.mount: Deactivated successfully. Feb 12 19:48:48.668438 kubelet[2003]: E0212 19:48:48.668404 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:49.934806 systemd[1]: Started sshd@16-10.0.0.138:22-10.0.0.1:59558.service. Feb 12 19:48:49.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.138:22-10.0.0.1:59558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:49.937885 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:48:49.937952 kernel: audit: type=1130 audit(1707767329.934:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.138:22-10.0.0.1:59558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:49.966000 audit[4426]: USER_ACCT pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.967150 sshd[4426]: Accepted publickey for core from 10.0.0.1 port 59558 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:49.968628 sshd[4426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:49.967000 audit[4426]: CRED_ACQ pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.972255 systemd-logind[1110]: New session 17 of user core. Feb 12 19:48:49.973337 systemd[1]: Started session-17.scope. Feb 12 19:48:49.973786 kernel: audit: type=1101 audit(1707767329.966:1402): pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.973832 kernel: audit: type=1103 audit(1707767329.967:1403): pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.973865 kernel: audit: type=1006 audit(1707767329.967:1404): pid=4426 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:48:49.975589 kernel: audit: type=1300 audit(1707767329.967:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7c48d70 a2=3 a3=0 items=0 ppid=1 pid=4426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:49.967000 audit[4426]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7c48d70 a2=3 a3=0 items=0 ppid=1 pid=4426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:49.967000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:49.976000 audit[4426]: USER_START pid=4426 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.982636 kernel: audit: type=1327 audit(1707767329.967:1404): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:49.982681 kernel: audit: type=1105 audit(1707767329.976:1405): pid=4426 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.982711 kernel: audit: type=1103 audit(1707767329.977:1406): pid=4429 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:49.977000 audit[4429]: CRED_ACQ pid=4429 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.070923 sshd[4426]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:50.072000 audit[4426]: USER_END pid=4426 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.074452 systemd[1]: Started sshd@17-10.0.0.138:22-10.0.0.1:59564.service. Feb 12 19:48:50.077793 kernel: audit: type=1106 audit(1707767330.072:1407): pid=4426 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.077836 kernel: audit: type=1130 audit(1707767330.075:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.138:22-10.0.0.1:59564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:50.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.138:22-10.0.0.1:59564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:50.077862 systemd[1]: sshd@16-10.0.0.138:22-10.0.0.1:59558.service: Deactivated successfully. Feb 12 19:48:50.078590 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:48:50.079162 systemd-logind[1110]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:48:50.075000 audit[4426]: CRED_DISP pid=4426 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.138:22-10.0.0.1:59558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:50.079897 systemd-logind[1110]: Removed session 17. Feb 12 19:48:50.104000 audit[4439]: USER_ACCT pid=4439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.105661 sshd[4439]: Accepted publickey for core from 10.0.0.1 port 59564 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:50.105000 audit[4439]: CRED_ACQ pid=4439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.105000 audit[4439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6d43d80 a2=3 a3=0 items=0 ppid=1 pid=4439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:50.105000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:50.106430 sshd[4439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:50.109230 systemd-logind[1110]: New session 18 of user core. Feb 12 19:48:50.110185 systemd[1]: Started session-18.scope. Feb 12 19:48:50.112000 audit[4439]: USER_START pid=4439 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.113000 audit[4442]: CRED_ACQ pid=4442 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.261228 sshd[4439]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:50.264897 systemd[1]: Started sshd@18-10.0.0.138:22-10.0.0.1:59568.service. Feb 12 19:48:50.261000 audit[4439]: USER_END pid=4439 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.261000 audit[4439]: CRED_DISP pid=4439 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.138:22-10.0.0.1:59568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:50.265520 systemd[1]: sshd@17-10.0.0.138:22-10.0.0.1:59564.service: Deactivated successfully. Feb 12 19:48:50.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.138:22-10.0.0.1:59564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:50.266184 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:48:50.267178 systemd-logind[1110]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:48:50.268029 systemd-logind[1110]: Removed session 18. Feb 12 19:48:50.295000 audit[4450]: USER_ACCT pid=4450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.296796 sshd[4450]: Accepted publickey for core from 10.0.0.1 port 59568 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:50.296000 audit[4450]: CRED_ACQ pid=4450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.296000 audit[4450]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe34689460 a2=3 a3=0 items=0 ppid=1 pid=4450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:50.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:50.297590 sshd[4450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:50.300928 systemd-logind[1110]: New session 19 of user core. Feb 12 19:48:50.301681 systemd[1]: Started session-19.scope. Feb 12 19:48:50.304000 audit[4450]: USER_START pid=4450 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:50.305000 audit[4453]: CRED_ACQ pid=4453 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.111000 audit[4466]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.111000 audit[4466]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffebc07f9f0 a2=0 a3=7ffebc07f9dc items=0 ppid=2204 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.112000 audit[4466]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.112000 audit[4466]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffebc07f9f0 a2=0 a3=31030 items=0 ppid=2204 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.121898 sshd[4450]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:51.122000 audit[4450]: USER_END pid=4450 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.122000 audit[4450]: CRED_DISP pid=4450 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.121000 audit[4468]: NETFILTER_CFG table=filter:111 family=2 entries=32 op=nft_register_rule pid=4468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.121000 audit[4468]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff1b04eae0 a2=0 a3=7fff1b04eacc items=0 ppid=2204 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.124438 systemd[1]: sshd@18-10.0.0.138:22-10.0.0.1:59568.service: Deactivated successfully. Feb 12 19:48:51.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.138:22-10.0.0.1:59568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:51.125184 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:48:51.126643 systemd[1]: Started sshd@19-10.0.0.138:22-10.0.0.1:59574.service. Feb 12 19:48:51.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.138:22-10.0.0.1:59574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:51.127456 systemd-logind[1110]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:48:51.128467 systemd-logind[1110]: Removed session 19. Feb 12 19:48:51.123000 audit[4468]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.123000 audit[4468]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff1b04eae0 a2=0 a3=31030 items=0 ppid=2204 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.157000 audit[4471]: USER_ACCT pid=4471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.158961 sshd[4471]: Accepted publickey for core from 10.0.0.1 port 59574 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:51.159000 audit[4471]: CRED_ACQ pid=4471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.159000 audit[4471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc5ab3610 a2=3 a3=0 items=0 ppid=1 pid=4471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:51.160096 sshd[4471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:51.163439 systemd-logind[1110]: New session 20 of user core. Feb 12 19:48:51.164157 systemd[1]: Started session-20.scope. Feb 12 19:48:51.167000 audit[4471]: USER_START pid=4471 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.168000 audit[4473]: CRED_ACQ pid=4473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.450094 sshd[4471]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:51.453911 systemd[1]: Started sshd@20-10.0.0.138:22-10.0.0.1:59576.service. Feb 12 19:48:51.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.138:22-10.0.0.1:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:51.454000 audit[4471]: USER_END pid=4471 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.454000 audit[4471]: CRED_DISP pid=4471 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.457193 systemd[1]: sshd@19-10.0.0.138:22-10.0.0.1:59574.service: Deactivated successfully. Feb 12 19:48:51.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.138:22-10.0.0.1:59574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:51.457808 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:48:51.458624 systemd-logind[1110]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:48:51.459366 systemd-logind[1110]: Removed session 20. Feb 12 19:48:51.485000 audit[4481]: USER_ACCT pid=4481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.486488 sshd[4481]: Accepted publickey for core from 10.0.0.1 port 59576 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:51.486000 audit[4481]: CRED_ACQ pid=4481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.487000 audit[4481]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd53171150 a2=3 a3=0 items=0 ppid=1 pid=4481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.487000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:51.488101 sshd[4481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:51.491574 systemd-logind[1110]: New session 21 of user core. Feb 12 19:48:51.492711 systemd[1]: Started session-21.scope. Feb 12 19:48:51.495000 audit[4481]: USER_START pid=4481 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.496000 audit[4484]: CRED_ACQ pid=4484 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.597289 sshd[4481]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:51.597000 audit[4481]: USER_END pid=4481 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.597000 audit[4481]: CRED_DISP pid=4481 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:51.599689 systemd[1]: sshd@20-10.0.0.138:22-10.0.0.1:59576.service: Deactivated successfully. Feb 12 19:48:51.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.138:22-10.0.0.1:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:51.600404 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:48:51.600974 systemd-logind[1110]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:48:51.601705 systemd-logind[1110]: Removed session 21. Feb 12 19:48:55.811463 kubelet[2003]: E0212 19:48:55.811425 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:56.317000 audit[4498]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:56.320045 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:48:56.320095 kernel: audit: type=1325 audit(1707767336.317:1450): table=filter:113 family=2 entries=20 op=nft_register_rule pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:56.320116 kernel: audit: type=1300 audit(1707767336.317:1450): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd8480f040 a2=0 a3=7ffd8480f02c items=0 ppid=2204 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.317000 audit[4498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd8480f040 a2=0 a3=7ffd8480f02c items=0 ppid=2204 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:56.324361 kernel: audit: type=1327 audit(1707767336.317:1450): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:56.319000 audit[4498]: NETFILTER_CFG table=nat:114 family=2 entries=104 op=nft_register_chain pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:56.319000 audit[4498]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffd8480f040 a2=0 a3=7ffd8480f02c items=0 ppid=2204 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.332584 kernel: audit: type=1325 audit(1707767336.319:1451): table=nat:114 family=2 entries=104 op=nft_register_chain pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:56.332638 kernel: audit: type=1300 audit(1707767336.319:1451): arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffd8480f040 a2=0 a3=7ffd8480f02c items=0 ppid=2204 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.332657 kernel: audit: type=1327 audit(1707767336.319:1451): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:56.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:56.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.138:22-10.0.0.1:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:56.601310 systemd[1]: Started sshd@21-10.0.0.138:22-10.0.0.1:46624.service. Feb 12 19:48:56.604786 kernel: audit: type=1130 audit(1707767336.600:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.138:22-10.0.0.1:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:56.630000 audit[4501]: USER_ACCT pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.631857 sshd[4501]: Accepted publickey for core from 10.0.0.1 port 46624 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:56.633995 sshd[4501]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:56.632000 audit[4501]: CRED_ACQ pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.636483 kernel: audit: type=1101 audit(1707767336.630:1453): pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.636577 kernel: audit: type=1103 audit(1707767336.632:1454): pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.636596 kernel: audit: type=1006 audit(1707767336.632:1455): pid=4501 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 19:48:56.637053 systemd-logind[1110]: New session 22 of user core. Feb 12 19:48:56.637721 systemd[1]: Started session-22.scope. Feb 12 19:48:56.632000 audit[4501]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1b3b1110 a2=3 a3=0 items=0 ppid=1 pid=4501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.632000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:56.640000 audit[4501]: USER_START pid=4501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.641000 audit[4503]: CRED_ACQ pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.734731 sshd[4501]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:56.734000 audit[4501]: USER_END pid=4501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.734000 audit[4501]: CRED_DISP pid=4501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:56.737006 systemd[1]: sshd@21-10.0.0.138:22-10.0.0.1:46624.service: Deactivated successfully. Feb 12 19:48:56.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.138:22-10.0.0.1:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:56.737676 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:48:56.738270 systemd-logind[1110]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:48:56.738820 systemd-logind[1110]: Removed session 22. Feb 12 19:48:57.811261 kubelet[2003]: E0212 19:48:57.811225 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:49:01.738677 systemd[1]: Started sshd@22-10.0.0.138:22-10.0.0.1:46636.service. Feb 12 19:49:01.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.138:22-10.0.0.1:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:01.741670 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:49:01.741714 kernel: audit: type=1130 audit(1707767341.738:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.138:22-10.0.0.1:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:01.768000 audit[4515]: USER_ACCT pid=4515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.769817 sshd[4515]: Accepted publickey for core from 10.0.0.1 port 46636 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:49:01.772245 sshd[4515]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:01.771000 audit[4515]: CRED_ACQ pid=4515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.774666 kernel: audit: type=1101 audit(1707767341.768:1462): pid=4515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.774705 kernel: audit: type=1103 audit(1707767341.771:1463): pid=4515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.774732 kernel: audit: type=1006 audit(1707767341.771:1464): pid=4515 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 19:49:01.775515 systemd-logind[1110]: New session 23 of user core. Feb 12 19:49:01.771000 audit[4515]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdda14d30 a2=3 a3=0 items=0 ppid=1 pid=4515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.776223 systemd[1]: Started session-23.scope. Feb 12 19:49:01.778909 kernel: audit: type=1300 audit(1707767341.771:1464): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdda14d30 a2=3 a3=0 items=0 ppid=1 pid=4515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.778950 kernel: audit: type=1327 audit(1707767341.771:1464): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:01.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:01.779000 audit[4515]: USER_START pid=4515 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.780000 audit[4517]: CRED_ACQ pid=4517 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.785621 kernel: audit: type=1105 audit(1707767341.779:1465): pid=4515 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.785707 kernel: audit: type=1103 audit(1707767341.780:1466): pid=4517 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.882677 sshd[4515]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:01.882000 audit[4515]: USER_END pid=4515 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.885030 systemd[1]: sshd@22-10.0.0.138:22-10.0.0.1:46636.service: Deactivated successfully. Feb 12 19:49:01.885704 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:49:01.886329 systemd-logind[1110]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:49:01.883000 audit[4515]: CRED_DISP pid=4515 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.887014 systemd-logind[1110]: Removed session 23. Feb 12 19:49:01.889172 kernel: audit: type=1106 audit(1707767341.882:1467): pid=4515 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.889214 kernel: audit: type=1104 audit(1707767341.883:1468): pid=4515 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:01.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.138:22-10.0.0.1:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:06.886658 systemd[1]: Started sshd@23-10.0.0.138:22-10.0.0.1:36596.service. Feb 12 19:49:06.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.138:22-10.0.0.1:36596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:06.889896 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:06.890040 kernel: audit: type=1130 audit(1707767346.886:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.138:22-10.0.0.1:36596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:06.916000 audit[4553]: USER_ACCT pid=4553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.917525 sshd[4553]: Accepted publickey for core from 10.0.0.1 port 36596 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:49:06.919000 audit[4553]: CRED_ACQ pid=4553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.920231 sshd[4553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:06.922425 kernel: audit: type=1101 audit(1707767346.916:1471): pid=4553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.922467 kernel: audit: type=1103 audit(1707767346.919:1472): pid=4553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.922488 kernel: audit: type=1006 audit(1707767346.919:1473): pid=4553 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:49:06.924003 kernel: audit: type=1300 audit(1707767346.919:1473): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0f7cb540 a2=3 a3=0 items=0 ppid=1 pid=4553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.919000 audit[4553]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0f7cb540 a2=3 a3=0 items=0 ppid=1 pid=4553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.923700 systemd-logind[1110]: New session 24 of user core. Feb 12 19:49:06.924110 systemd[1]: Started session-24.scope. Feb 12 19:49:06.926672 kernel: audit: type=1327 audit(1707767346.919:1473): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:06.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:06.928000 audit[4553]: USER_START pid=4553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.929000 audit[4555]: CRED_ACQ pid=4555 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.934336 kernel: audit: type=1105 audit(1707767346.928:1474): pid=4553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:06.934383 kernel: audit: type=1103 audit(1707767346.929:1475): pid=4555 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:07.024867 sshd[4553]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:07.027000 audit[4553]: USER_END pid=4553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:07.029400 systemd[1]: sshd@23-10.0.0.138:22-10.0.0.1:36596.service: Deactivated successfully. Feb 12 19:49:07.030075 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:49:07.027000 audit[4553]: CRED_DISP pid=4553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:07.033311 systemd-logind[1110]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:49:07.033501 kernel: audit: type=1106 audit(1707767347.027:1476): pid=4553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:07.033597 kernel: audit: type=1104 audit(1707767347.027:1477): pid=4553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:07.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.138:22-10.0.0.1:36596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:07.034137 systemd-logind[1110]: Removed session 24. Feb 12 19:49:09.811475 kubelet[2003]: E0212 19:49:09.811438 2003 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:49:09.855836 kubelet[2003]: I0212 19:49:09.855798 2003 topology_manager.go:215] "Topology Admit Handler" podUID="1ec33d14-92f5-4e7e-8223-903f34b9e6d6" podNamespace="calico-apiserver" podName="calico-apiserver-784d47c46b-2wnqj" Feb 12 19:49:09.861705 systemd[1]: Created slice kubepods-besteffort-pod1ec33d14_92f5_4e7e_8223_903f34b9e6d6.slice. Feb 12 19:49:09.862451 kubelet[2003]: I0212 19:49:09.862426 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1ec33d14-92f5-4e7e-8223-903f34b9e6d6-calico-apiserver-certs\") pod \"calico-apiserver-784d47c46b-2wnqj\" (UID: \"1ec33d14-92f5-4e7e-8223-903f34b9e6d6\") " pod="calico-apiserver/calico-apiserver-784d47c46b-2wnqj" Feb 12 19:49:09.862513 kubelet[2003]: I0212 19:49:09.862460 2003 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xq64l\" (UniqueName: \"kubernetes.io/projected/1ec33d14-92f5-4e7e-8223-903f34b9e6d6-kube-api-access-xq64l\") pod \"calico-apiserver-784d47c46b-2wnqj\" (UID: \"1ec33d14-92f5-4e7e-8223-903f34b9e6d6\") " pod="calico-apiserver/calico-apiserver-784d47c46b-2wnqj" Feb 12 19:49:09.863000 audit[4569]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.863000 audit[4569]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff3e87bd40 a2=0 a3=7fff3e87bd2c items=0 ppid=2204 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.864000 audit[4569]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.864000 audit[4569]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff3e87bd40 a2=0 a3=7fff3e87bd2c items=0 ppid=2204 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.874000 audit[4571]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.874000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd5d19bec0 a2=0 a3=7ffd5d19beac items=0 ppid=2204 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.877000 audit[4571]: NETFILTER_CFG table=nat:118 family=2 entries=44 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.877000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd5d19bec0 a2=0 a3=7ffd5d19beac items=0 ppid=2204 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.963717 kubelet[2003]: E0212 19:49:09.963688 2003 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:49:09.963826 kubelet[2003]: E0212 19:49:09.963799 2003 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/1ec33d14-92f5-4e7e-8223-903f34b9e6d6-calico-apiserver-certs podName:1ec33d14-92f5-4e7e-8223-903f34b9e6d6 nodeName:}" failed. No retries permitted until 2024-02-12 19:49:10.463762246 +0000 UTC m=+90.744029857 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/1ec33d14-92f5-4e7e-8223-903f34b9e6d6-calico-apiserver-certs") pod "calico-apiserver-784d47c46b-2wnqj" (UID: "1ec33d14-92f5-4e7e-8223-903f34b9e6d6") : secret "calico-apiserver-certs" not found Feb 12 19:49:10.765388 env[1123]: time="2024-02-12T19:49:10.765337410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-784d47c46b-2wnqj,Uid:1ec33d14-92f5-4e7e-8223-903f34b9e6d6,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:49:10.854600 systemd-networkd[1018]: cali74f305ad742: Link UP Feb 12 19:49:10.855821 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali74f305ad742: link becomes ready Feb 12 19:49:10.855631 systemd-networkd[1018]: cali74f305ad742: Gained carrier Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.797 [INFO][4574] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0 calico-apiserver-784d47c46b- calico-apiserver 1ec33d14-92f5-4e7e-8223-903f34b9e6d6 1114 0 2024-02-12 19:49:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:784d47c46b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-784d47c46b-2wnqj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali74f305ad742 [] []}} ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.798 [INFO][4574] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.819 [INFO][4588] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" HandleID="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Workload="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.829 [INFO][4588] ipam_plugin.go 268: Auto assigning IP ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" HandleID="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Workload="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000249b40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-784d47c46b-2wnqj", "timestamp":"2024-02-12 19:49:10.819110363 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.829 [INFO][4588] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.830 [INFO][4588] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.830 [INFO][4588] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.831 [INFO][4588] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.835 [INFO][4588] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.840 [INFO][4588] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.841 [INFO][4588] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.843 [INFO][4588] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.843 [INFO][4588] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.844 [INFO][4588] ipam.go 1682: Creating new handle: k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.846 [INFO][4588] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.850 [INFO][4588] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.850 [INFO][4588] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" host="localhost" Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.850 [INFO][4588] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:10.865466 env[1123]: 2024-02-12 19:49:10.851 [INFO][4588] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" HandleID="k8s-pod-network.1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Workload="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.866039 env[1123]: 2024-02-12 19:49:10.853 [INFO][4574] k8s.go 385: Populated endpoint ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0", GenerateName:"calico-apiserver-784d47c46b-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ec33d14-92f5-4e7e-8223-903f34b9e6d6", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"784d47c46b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-784d47c46b-2wnqj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali74f305ad742", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.866039 env[1123]: 2024-02-12 19:49:10.853 [INFO][4574] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.866039 env[1123]: 2024-02-12 19:49:10.853 [INFO][4574] dataplane_linux.go 68: Setting the host side veth name to cali74f305ad742 ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.866039 env[1123]: 2024-02-12 19:49:10.854 [INFO][4574] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.866039 env[1123]: 2024-02-12 19:49:10.856 [INFO][4574] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0", GenerateName:"calico-apiserver-784d47c46b-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ec33d14-92f5-4e7e-8223-903f34b9e6d6", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"784d47c46b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f", Pod:"calico-apiserver-784d47c46b-2wnqj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali74f305ad742", MAC:"06:25:da:5d:35:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.866039 env[1123]: 2024-02-12 19:49:10.863 [INFO][4574] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-2wnqj" WorkloadEndpoint="localhost-k8s-calico--apiserver--784d47c46b--2wnqj-eth0" Feb 12 19:49:10.877737 env[1123]: time="2024-02-12T19:49:10.877633562Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:10.877737 env[1123]: time="2024-02-12T19:49:10.877705799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:10.877920 env[1123]: time="2024-02-12T19:49:10.877740315Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:10.877944 env[1123]: time="2024-02-12T19:49:10.877899417Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f pid=4623 runtime=io.containerd.runc.v2 Feb 12 19:49:10.879000 audit[4631]: NETFILTER_CFG table=filter:119 family=2 entries=59 op=nft_register_chain pid=4631 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:10.879000 audit[4631]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffdb29fc440 a2=0 a3=7ffdb29fc42c items=0 ppid=3299 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.879000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:10.890998 systemd[1]: Started cri-containerd-1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f.scope. Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit: BPF prog-id=180 op=LOAD Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4623 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646436666435646665396265666431333166376566393634613031 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4623 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646436666435646665396265666431333166376566393634613031 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit: BPF prog-id=181 op=LOAD Feb 12 19:49:10.900000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221620 items=0 ppid=4623 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646436666435646665396265666431333166376566393634613031 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit: BPF prog-id=182 op=LOAD Feb 12 19:49:10.900000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221668 items=0 ppid=4623 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646436666435646665396265666431333166376566393634613031 Feb 12 19:49:10.900000 audit: BPF prog-id=182 op=UNLOAD Feb 12 19:49:10.900000 audit: BPF prog-id=181 op=UNLOAD Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.900000 audit: BPF prog-id=183 op=LOAD Feb 12 19:49:10.900000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221a78 items=0 ppid=4623 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163646436666435646665396265666431333166376566393634613031 Feb 12 19:49:10.902348 systemd-resolved[1069]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:49:10.924076 env[1123]: time="2024-02-12T19:49:10.924032457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-784d47c46b-2wnqj,Uid:1ec33d14-92f5-4e7e-8223-903f34b9e6d6,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"1cdd6fd5dfe9befd131f7ef964a01331b33d83d15a45dc6d94900086fef7817f\"" Feb 12 19:49:10.925274 env[1123]: time="2024-02-12T19:49:10.925247624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:49:12.029065 systemd[1]: Started sshd@24-10.0.0.138:22-10.0.0.1:36610.service. Feb 12 19:49:12.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.138:22-10.0.0.1:36610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:12.029869 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 12 19:49:12.029913 kernel: audit: type=1130 audit(1707767352.028:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.138:22-10.0.0.1:36610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:12.060000 audit[4658]: USER_ACCT pid=4658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.061809 sshd[4658]: Accepted publickey for core from 10.0.0.1 port 36610 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:49:12.063209 sshd[4658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:12.060000 audit[4658]: CRED_ACQ pid=4658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.066488 systemd-logind[1110]: New session 25 of user core. Feb 12 19:49:12.067170 systemd[1]: Started session-25.scope. Feb 12 19:49:12.067985 kernel: audit: type=1101 audit(1707767352.060:1503): pid=4658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.068053 kernel: audit: type=1103 audit(1707767352.060:1504): pid=4658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.068084 kernel: audit: type=1006 audit(1707767352.060:1505): pid=4658 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:49:12.060000 audit[4658]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b5c1350 a2=3 a3=0 items=0 ppid=1 pid=4658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:12.072431 kernel: audit: type=1300 audit(1707767352.060:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b5c1350 a2=3 a3=0 items=0 ppid=1 pid=4658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:12.072482 kernel: audit: type=1327 audit(1707767352.060:1505): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:12.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:12.068000 audit[4658]: USER_START pid=4658 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.076557 kernel: audit: type=1105 audit(1707767352.068:1506): pid=4658 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.076605 kernel: audit: type=1103 audit(1707767352.072:1507): pid=4660 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.072000 audit[4660]: CRED_ACQ pid=4660 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.155969 systemd-networkd[1018]: cali74f305ad742: Gained IPv6LL Feb 12 19:49:12.169131 sshd[4658]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:12.169000 audit[4658]: USER_END pid=4658 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.171737 systemd[1]: sshd@24-10.0.0.138:22-10.0.0.1:36610.service: Deactivated successfully. Feb 12 19:49:12.172402 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:49:12.173001 systemd-logind[1110]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:49:12.169000 audit[4658]: CRED_DISP pid=4658 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.173917 systemd-logind[1110]: Removed session 25. Feb 12 19:49:12.176083 kernel: audit: type=1106 audit(1707767352.169:1508): pid=4658 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.176124 kernel: audit: type=1104 audit(1707767352.169:1509): pid=4658 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:49:12.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.138:22-10.0.0.1:36610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:13.688154 systemd[1]: run-containerd-runc-k8s.io-473a6ba62143975cfab789a8bc7a0c9c13270241ad7287d68afdf1796b1436d2-runc.3Jx57Q.mount: Deactivated successfully.