Feb 9 10:07:03.737373 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 10:07:03.737396 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:07:03.737404 kernel: efi: EFI v2.70 by EDK II Feb 9 10:07:03.737409 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 9 10:07:03.737414 kernel: random: crng init done Feb 9 10:07:03.737420 kernel: ACPI: Early table checksum verification disabled Feb 9 10:07:03.737426 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 9 10:07:03.737433 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 9 10:07:03.737438 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737444 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737449 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737454 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737460 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737466 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737473 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737479 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737485 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:07:03.737491 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 9 10:07:03.737496 kernel: NUMA: Failed to initialise from firmware Feb 9 10:07:03.737502 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:07:03.737508 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Feb 9 10:07:03.737514 kernel: Zone ranges: Feb 9 10:07:03.737519 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:07:03.737526 kernel: DMA32 empty Feb 9 10:07:03.737532 kernel: Normal empty Feb 9 10:07:03.737538 kernel: Movable zone start for each node Feb 9 10:07:03.737548 kernel: Early memory node ranges Feb 9 10:07:03.737554 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 9 10:07:03.737560 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 9 10:07:03.737568 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 9 10:07:03.737574 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 9 10:07:03.737580 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 9 10:07:03.737586 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 9 10:07:03.737592 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 9 10:07:03.737598 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:07:03.737605 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 9 10:07:03.737611 kernel: psci: probing for conduit method from ACPI. Feb 9 10:07:03.737616 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 10:07:03.737622 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:07:03.737628 kernel: psci: Trusted OS migration not required Feb 9 10:07:03.737636 kernel: psci: SMC Calling Convention v1.1 Feb 9 10:07:03.737643 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 9 10:07:03.737650 kernel: ACPI: SRAT not present Feb 9 10:07:03.737656 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:07:03.737662 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:07:03.737669 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 9 10:07:03.737675 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:07:03.737681 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:07:03.737687 kernel: CPU features: detected: Hardware dirty bit management Feb 9 10:07:03.737693 kernel: CPU features: detected: Spectre-v4 Feb 9 10:07:03.737698 kernel: CPU features: detected: Spectre-BHB Feb 9 10:07:03.737706 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:07:03.737712 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:07:03.737718 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 10:07:03.737738 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 9 10:07:03.737745 kernel: Policy zone: DMA Feb 9 10:07:03.737752 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:07:03.737758 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:07:03.737764 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:07:03.737770 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:07:03.737777 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:07:03.737783 kernel: Memory: 2459148K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113140K reserved, 0K cma-reserved) Feb 9 10:07:03.737791 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 10:07:03.737797 kernel: trace event string verifier disabled Feb 9 10:07:03.737803 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:07:03.737809 kernel: rcu: RCU event tracing is enabled. Feb 9 10:07:03.737816 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 10:07:03.737822 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:07:03.737828 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:07:03.737834 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:07:03.737840 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 10:07:03.737846 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:07:03.737852 kernel: GICv3: 256 SPIs implemented Feb 9 10:07:03.737859 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:07:03.737865 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:07:03.737871 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:07:03.737877 kernel: GICv3: 16 PPIs implemented Feb 9 10:07:03.737883 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 9 10:07:03.737889 kernel: ACPI: SRAT not present Feb 9 10:07:03.737901 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 9 10:07:03.737909 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 10:07:03.737915 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 9 10:07:03.737921 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 9 10:07:03.737927 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 9 10:07:03.737934 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:07:03.737941 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 10:07:03.737947 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 10:07:03.737954 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 10:07:03.737960 kernel: arm-pv: using stolen time PV Feb 9 10:07:03.737966 kernel: Console: colour dummy device 80x25 Feb 9 10:07:03.737972 kernel: ACPI: Core revision 20210730 Feb 9 10:07:03.737979 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 10:07:03.737985 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:07:03.737991 kernel: LSM: Security Framework initializing Feb 9 10:07:03.737997 kernel: SELinux: Initializing. Feb 9 10:07:03.738005 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:07:03.738011 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:07:03.738017 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:07:03.738023 kernel: Platform MSI: ITS@0x8080000 domain created Feb 9 10:07:03.738030 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 9 10:07:03.738036 kernel: Remapping and enabling EFI services. Feb 9 10:07:03.738042 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:07:03.738048 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:07:03.738054 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 9 10:07:03.738062 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 9 10:07:03.738068 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:07:03.738074 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 10:07:03.738081 kernel: Detected PIPT I-cache on CPU2 Feb 9 10:07:03.738088 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 9 10:07:03.738094 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 9 10:07:03.738100 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:07:03.738106 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 9 10:07:03.738113 kernel: Detected PIPT I-cache on CPU3 Feb 9 10:07:03.738119 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 9 10:07:03.738126 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 9 10:07:03.738132 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:07:03.738139 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 9 10:07:03.738145 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 10:07:03.738156 kernel: SMP: Total of 4 processors activated. Feb 9 10:07:03.738163 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:07:03.738170 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 10:07:03.738176 kernel: CPU features: detected: Common not Private translations Feb 9 10:07:03.738183 kernel: CPU features: detected: CRC32 instructions Feb 9 10:07:03.738189 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 10:07:03.738196 kernel: CPU features: detected: LSE atomic instructions Feb 9 10:07:03.738202 kernel: CPU features: detected: Privileged Access Never Feb 9 10:07:03.738210 kernel: CPU features: detected: RAS Extension Support Feb 9 10:07:03.738217 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 9 10:07:03.738223 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:07:03.738230 kernel: alternatives: patching kernel code Feb 9 10:07:03.738238 kernel: devtmpfs: initialized Feb 9 10:07:03.738251 kernel: KASLR enabled Feb 9 10:07:03.738258 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:07:03.738265 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 10:07:03.738271 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:07:03.738278 kernel: SMBIOS 3.0.0 present. Feb 9 10:07:03.738284 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 9 10:07:03.738291 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:07:03.738298 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:07:03.738304 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:07:03.738312 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:07:03.738319 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:07:03.738326 kernel: audit: type=2000 audit(0.030:1): state=initialized audit_enabled=0 res=1 Feb 9 10:07:03.738332 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:07:03.738339 kernel: cpuidle: using governor menu Feb 9 10:07:03.738345 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:07:03.738352 kernel: ASID allocator initialised with 32768 entries Feb 9 10:07:03.738358 kernel: ACPI: bus type PCI registered Feb 9 10:07:03.738365 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:07:03.738373 kernel: Serial: AMBA PL011 UART driver Feb 9 10:07:03.738379 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:07:03.738386 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:07:03.738392 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:07:03.738399 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:07:03.738405 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:07:03.738412 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:07:03.738419 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:07:03.738425 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:07:03.738433 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:07:03.738440 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:07:03.738446 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:07:03.738453 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:07:03.738459 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:07:03.738466 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:07:03.738472 kernel: ACPI: Interpreter enabled Feb 9 10:07:03.738479 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:07:03.738485 kernel: ACPI: MCFG table detected, 1 entries Feb 9 10:07:03.738493 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 9 10:07:03.738500 kernel: printk: console [ttyAMA0] enabled Feb 9 10:07:03.738506 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 10:07:03.738634 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 10:07:03.738698 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 10:07:03.738757 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 10:07:03.738815 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 9 10:07:03.738876 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 9 10:07:03.738885 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 9 10:07:03.738891 kernel: PCI host bridge to bus 0000:00 Feb 9 10:07:03.738970 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 9 10:07:03.739025 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 10:07:03.739081 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 9 10:07:03.739135 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 10:07:03.739217 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 9 10:07:03.739310 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 10:07:03.739374 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 9 10:07:03.739435 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 9 10:07:03.739497 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 10:07:03.739558 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 10:07:03.739619 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 9 10:07:03.739681 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 9 10:07:03.739736 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 9 10:07:03.739788 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 10:07:03.739842 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 9 10:07:03.739851 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 10:07:03.739858 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 10:07:03.739864 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 10:07:03.739873 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 10:07:03.739880 kernel: iommu: Default domain type: Translated Feb 9 10:07:03.739887 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:07:03.739893 kernel: vgaarb: loaded Feb 9 10:07:03.739906 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:07:03.739913 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:07:03.739920 kernel: PTP clock support registered Feb 9 10:07:03.739926 kernel: Registered efivars operations Feb 9 10:07:03.739933 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:07:03.739939 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:07:03.739948 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:07:03.739954 kernel: pnp: PnP ACPI init Feb 9 10:07:03.740023 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 9 10:07:03.740033 kernel: pnp: PnP ACPI: found 1 devices Feb 9 10:07:03.740039 kernel: NET: Registered PF_INET protocol family Feb 9 10:07:03.740046 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:07:03.740053 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:07:03.740060 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:07:03.740068 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:07:03.740075 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:07:03.740081 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:07:03.740088 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:07:03.740095 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:07:03.740101 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:07:03.740108 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:07:03.740114 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 9 10:07:03.740122 kernel: kvm [1]: HYP mode not available Feb 9 10:07:03.740129 kernel: Initialise system trusted keyrings Feb 9 10:07:03.740135 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:07:03.740142 kernel: Key type asymmetric registered Feb 9 10:07:03.740148 kernel: Asymmetric key parser 'x509' registered Feb 9 10:07:03.740155 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:07:03.740161 kernel: io scheduler mq-deadline registered Feb 9 10:07:03.740168 kernel: io scheduler kyber registered Feb 9 10:07:03.740174 kernel: io scheduler bfq registered Feb 9 10:07:03.740181 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 10:07:03.740189 kernel: ACPI: button: Power Button [PWRB] Feb 9 10:07:03.740195 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 10:07:03.740266 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 9 10:07:03.740276 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:07:03.740282 kernel: thunder_xcv, ver 1.0 Feb 9 10:07:03.740289 kernel: thunder_bgx, ver 1.0 Feb 9 10:07:03.740295 kernel: nicpf, ver 1.0 Feb 9 10:07:03.740302 kernel: nicvf, ver 1.0 Feb 9 10:07:03.740373 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:07:03.740433 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:07:03 UTC (1707473223) Feb 9 10:07:03.740442 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:07:03.740448 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:07:03.740455 kernel: Segment Routing with IPv6 Feb 9 10:07:03.740462 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:07:03.740468 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:07:03.740474 kernel: Key type dns_resolver registered Feb 9 10:07:03.740481 kernel: registered taskstats version 1 Feb 9 10:07:03.740489 kernel: Loading compiled-in X.509 certificates Feb 9 10:07:03.740496 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:07:03.740502 kernel: Key type .fscrypt registered Feb 9 10:07:03.740509 kernel: Key type fscrypt-provisioning registered Feb 9 10:07:03.740515 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:07:03.740522 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:07:03.740529 kernel: ima: No architecture policies found Feb 9 10:07:03.740535 kernel: Freeing unused kernel memory: 34688K Feb 9 10:07:03.740542 kernel: Run /init as init process Feb 9 10:07:03.740550 kernel: with arguments: Feb 9 10:07:03.740556 kernel: /init Feb 9 10:07:03.740562 kernel: with environment: Feb 9 10:07:03.740568 kernel: HOME=/ Feb 9 10:07:03.740575 kernel: TERM=linux Feb 9 10:07:03.740581 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:07:03.740590 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:07:03.740599 systemd[1]: Detected virtualization kvm. Feb 9 10:07:03.740608 systemd[1]: Detected architecture arm64. Feb 9 10:07:03.740615 systemd[1]: Running in initrd. Feb 9 10:07:03.740622 systemd[1]: No hostname configured, using default hostname. Feb 9 10:07:03.740629 systemd[1]: Hostname set to . Feb 9 10:07:03.740636 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:07:03.740643 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:07:03.740650 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:07:03.740657 systemd[1]: Reached target cryptsetup.target. Feb 9 10:07:03.740683 systemd[1]: Reached target paths.target. Feb 9 10:07:03.740692 systemd[1]: Reached target slices.target. Feb 9 10:07:03.740699 systemd[1]: Reached target swap.target. Feb 9 10:07:03.740706 systemd[1]: Reached target timers.target. Feb 9 10:07:03.740713 systemd[1]: Listening on iscsid.socket. Feb 9 10:07:03.740720 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:07:03.740728 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:07:03.740736 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:07:03.740743 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:07:03.740750 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:07:03.740758 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:07:03.740765 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:07:03.740772 systemd[1]: Reached target sockets.target. Feb 9 10:07:03.740779 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:07:03.740786 systemd[1]: Finished network-cleanup.service. Feb 9 10:07:03.740793 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:07:03.740801 systemd[1]: Starting systemd-journald.service... Feb 9 10:07:03.740809 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:07:03.740816 systemd[1]: Starting systemd-resolved.service... Feb 9 10:07:03.740823 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:07:03.740830 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:07:03.740837 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:07:03.740844 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:07:03.740851 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:07:03.740859 kernel: audit: type=1130 audit(1707473223.738:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.740875 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:07:03.740886 systemd-journald[290]: Journal started Feb 9 10:07:03.740932 systemd-journald[290]: Runtime Journal (/run/log/journal/f0769b99536446778066d457cc4f5ae7) is 6.0M, max 48.7M, 42.6M free. Feb 9 10:07:03.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.733664 systemd-modules-load[291]: Inserted module 'overlay' Feb 9 10:07:03.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.745601 kernel: audit: type=1130 audit(1707473223.742:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.745621 systemd[1]: Started systemd-journald.service. Feb 9 10:07:03.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.748906 kernel: audit: type=1130 audit(1707473223.745:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.748282 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:07:03.751255 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:07:03.753154 systemd-modules-load[291]: Inserted module 'br_netfilter' Feb 9 10:07:03.753965 kernel: Bridge firewalling registered Feb 9 10:07:03.763281 kernel: SCSI subsystem initialized Feb 9 10:07:03.764256 systemd-resolved[292]: Positive Trust Anchors: Feb 9 10:07:03.764269 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:07:03.764296 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:07:03.768259 systemd-resolved[292]: Defaulting to hostname 'linux'. Feb 9 10:07:03.775229 kernel: audit: type=1130 audit(1707473223.770:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.775259 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:07:03.775270 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:07:03.775279 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:07:03.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.769009 systemd[1]: Started systemd-resolved.service. Feb 9 10:07:03.772455 systemd[1]: Reached target nss-lookup.target. Feb 9 10:07:03.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.775432 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:07:03.779356 kernel: audit: type=1130 audit(1707473223.776:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.778976 systemd-modules-load[291]: Inserted module 'dm_multipath' Feb 9 10:07:03.779491 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:07:03.780665 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:07:03.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.783842 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:07:03.784889 kernel: audit: type=1130 audit(1707473223.781:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.788931 dracut-cmdline[310]: dracut-dracut-053 Feb 9 10:07:03.790800 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:07:03.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.793576 dracut-cmdline[310]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:07:03.796673 kernel: audit: type=1130 audit(1707473223.791:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.846273 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:07:03.854266 kernel: iscsi: registered transport (tcp) Feb 9 10:07:03.869265 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:07:03.869278 kernel: QLogic iSCSI HBA Driver Feb 9 10:07:03.902202 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:07:03.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.903677 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:07:03.905936 kernel: audit: type=1130 audit(1707473223.902:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:03.949267 kernel: raid6: neonx8 gen() 13797 MB/s Feb 9 10:07:03.966257 kernel: raid6: neonx8 xor() 10768 MB/s Feb 9 10:07:03.983255 kernel: raid6: neonx4 gen() 13561 MB/s Feb 9 10:07:04.000257 kernel: raid6: neonx4 xor() 11047 MB/s Feb 9 10:07:04.017260 kernel: raid6: neonx2 gen() 12982 MB/s Feb 9 10:07:04.034260 kernel: raid6: neonx2 xor() 10233 MB/s Feb 9 10:07:04.051259 kernel: raid6: neonx1 gen() 10504 MB/s Feb 9 10:07:04.068259 kernel: raid6: neonx1 xor() 8791 MB/s Feb 9 10:07:04.085266 kernel: raid6: int64x8 gen() 6275 MB/s Feb 9 10:07:04.102259 kernel: raid6: int64x8 xor() 3537 MB/s Feb 9 10:07:04.119261 kernel: raid6: int64x4 gen() 7218 MB/s Feb 9 10:07:04.136257 kernel: raid6: int64x4 xor() 3854 MB/s Feb 9 10:07:04.153257 kernel: raid6: int64x2 gen() 6128 MB/s Feb 9 10:07:04.170261 kernel: raid6: int64x2 xor() 3298 MB/s Feb 9 10:07:04.187257 kernel: raid6: int64x1 gen() 5030 MB/s Feb 9 10:07:04.204462 kernel: raid6: int64x1 xor() 2641 MB/s Feb 9 10:07:04.204476 kernel: raid6: using algorithm neonx8 gen() 13797 MB/s Feb 9 10:07:04.204485 kernel: raid6: .... xor() 10768 MB/s, rmw enabled Feb 9 10:07:04.204494 kernel: raid6: using neon recovery algorithm Feb 9 10:07:04.215388 kernel: xor: measuring software checksum speed Feb 9 10:07:04.215401 kernel: 8regs : 17300 MB/sec Feb 9 10:07:04.216288 kernel: 32regs : 20760 MB/sec Feb 9 10:07:04.217447 kernel: arm64_neon : 27901 MB/sec Feb 9 10:07:04.217457 kernel: xor: using function: arm64_neon (27901 MB/sec) Feb 9 10:07:04.272265 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:07:04.282615 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:07:04.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:04.284195 systemd[1]: Starting systemd-udevd.service... Feb 9 10:07:04.286703 kernel: audit: type=1130 audit(1707473224.283:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:04.283000 audit: BPF prog-id=7 op=LOAD Feb 9 10:07:04.283000 audit: BPF prog-id=8 op=LOAD Feb 9 10:07:04.297626 systemd-udevd[490]: Using default interface naming scheme 'v252'. Feb 9 10:07:04.301629 systemd[1]: Started systemd-udevd.service. Feb 9 10:07:04.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:04.302923 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:07:04.314329 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 10:07:04.340420 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:07:04.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:04.341934 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:07:04.375222 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:07:04.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:04.407005 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 10:07:04.409437 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 10:07:04.409465 kernel: GPT:9289727 != 19775487 Feb 9 10:07:04.409475 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 10:07:04.410648 kernel: GPT:9289727 != 19775487 Feb 9 10:07:04.410663 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 10:07:04.410671 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:07:04.425890 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:07:04.427448 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (544) Feb 9 10:07:04.434319 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:07:04.435138 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:07:04.439412 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:07:04.442490 systemd[1]: Starting disk-uuid.service... Feb 9 10:07:04.448269 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:07:04.450352 disk-uuid[562]: Primary Header is updated. Feb 9 10:07:04.450352 disk-uuid[562]: Secondary Entries is updated. Feb 9 10:07:04.450352 disk-uuid[562]: Secondary Header is updated. Feb 9 10:07:04.453270 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:07:05.465742 disk-uuid[563]: The operation has completed successfully. Feb 9 10:07:05.467087 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:07:05.487502 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:07:05.488618 systemd[1]: Finished disk-uuid.service. Feb 9 10:07:05.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.493191 systemd[1]: Starting verity-setup.service... Feb 9 10:07:05.507372 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:07:05.528544 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:07:05.530655 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:07:05.532360 systemd[1]: Finished verity-setup.service. Feb 9 10:07:05.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.577263 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:07:05.577624 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:07:05.578459 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:07:05.579159 systemd[1]: Starting ignition-setup.service... Feb 9 10:07:05.580959 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:07:05.587412 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:07:05.587449 kernel: BTRFS info (device vda6): using free space tree Feb 9 10:07:05.587459 kernel: BTRFS info (device vda6): has skinny extents Feb 9 10:07:05.597195 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:07:05.618309 systemd[1]: Finished ignition-setup.service. Feb 9 10:07:05.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.619748 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:07:05.666323 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:07:05.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.667000 audit: BPF prog-id=9 op=LOAD Feb 9 10:07:05.668200 systemd[1]: Starting systemd-networkd.service... Feb 9 10:07:05.699410 systemd-networkd[740]: lo: Link UP Feb 9 10:07:05.700211 systemd-networkd[740]: lo: Gained carrier Feb 9 10:07:05.701409 systemd-networkd[740]: Enumeration completed Feb 9 10:07:05.702101 systemd[1]: Started systemd-networkd.service. Feb 9 10:07:05.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.702853 systemd[1]: Reached target network.target. Feb 9 10:07:05.704575 systemd[1]: Starting iscsiuio.service... Feb 9 10:07:05.706449 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:07:05.709677 systemd-networkd[740]: eth0: Link UP Feb 9 10:07:05.709686 systemd-networkd[740]: eth0: Gained carrier Feb 9 10:07:05.715092 systemd[1]: Started iscsiuio.service. Feb 9 10:07:05.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.716525 systemd[1]: Starting iscsid.service... Feb 9 10:07:05.721234 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:07:05.721234 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:07:05.721234 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:07:05.721234 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:07:05.721234 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:07:05.721234 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:07:05.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.723689 systemd[1]: Started iscsid.service. Feb 9 10:07:05.725072 ignition[685]: Ignition 2.14.0 Feb 9 10:07:05.728328 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.126/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 10:07:05.725079 ignition[685]: Stage: fetch-offline Feb 9 10:07:05.728645 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:07:05.725123 ignition[685]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:07:05.725145 ignition[685]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:07:05.725287 ignition[685]: parsed url from cmdline: "" Feb 9 10:07:05.725290 ignition[685]: no config URL provided Feb 9 10:07:05.725295 ignition[685]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:07:05.725302 ignition[685]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:07:05.725321 ignition[685]: op(1): [started] loading QEMU firmware config module Feb 9 10:07:05.725325 ignition[685]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 10:07:05.731427 ignition[685]: op(1): [finished] loading QEMU firmware config module Feb 9 10:07:05.740159 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:07:05.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.741154 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:07:05.742276 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:07:05.743544 systemd[1]: Reached target remote-fs.target. Feb 9 10:07:05.745438 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:07:05.752842 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:07:05.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.809406 ignition[685]: parsing config with SHA512: 72defc3bb7f45c8627c89e3beffa55b2f17015f0c1b1faf4a4990fdb75d69de5301128656a9ad97483b601ca76238cb31acdf8696c3b209fdf0edfb7d9e8ef64 Feb 9 10:07:05.844679 unknown[685]: fetched base config from "system" Feb 9 10:07:05.845291 unknown[685]: fetched user config from "qemu" Feb 9 10:07:05.845952 ignition[685]: fetch-offline: fetch-offline passed Feb 9 10:07:05.846016 ignition[685]: Ignition finished successfully Feb 9 10:07:05.847047 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:07:05.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.847785 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 10:07:05.848506 systemd[1]: Starting ignition-kargs.service... Feb 9 10:07:05.856895 ignition[763]: Ignition 2.14.0 Feb 9 10:07:05.856906 ignition[763]: Stage: kargs Feb 9 10:07:05.856997 ignition[763]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:07:05.857006 ignition[763]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:07:05.858075 ignition[763]: kargs: kargs passed Feb 9 10:07:05.858120 ignition[763]: Ignition finished successfully Feb 9 10:07:05.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.860444 systemd[1]: Finished ignition-kargs.service. Feb 9 10:07:05.861744 systemd[1]: Starting ignition-disks.service... Feb 9 10:07:05.868425 ignition[769]: Ignition 2.14.0 Feb 9 10:07:05.868434 ignition[769]: Stage: disks Feb 9 10:07:05.868520 ignition[769]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:07:05.868530 ignition[769]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:07:05.870748 systemd[1]: Finished ignition-disks.service. Feb 9 10:07:05.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.869612 ignition[769]: disks: disks passed Feb 9 10:07:05.871957 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:07:05.869657 ignition[769]: Ignition finished successfully Feb 9 10:07:05.872879 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:07:05.873784 systemd[1]: Reached target local-fs.target. Feb 9 10:07:05.874867 systemd[1]: Reached target sysinit.target. Feb 9 10:07:05.875773 systemd[1]: Reached target basic.target. Feb 9 10:07:05.877532 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:07:05.887717 systemd-fsck[778]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 10:07:05.892021 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:07:05.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.894795 systemd[1]: Mounting sysroot.mount... Feb 9 10:07:05.901254 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:07:05.901533 systemd[1]: Mounted sysroot.mount. Feb 9 10:07:05.902096 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:07:05.903873 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:07:05.904601 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 10:07:05.904637 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:07:05.904661 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:07:05.906571 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:07:05.908563 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:07:05.912636 initrd-setup-root[788]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:07:05.917015 initrd-setup-root[796]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:07:05.920797 initrd-setup-root[804]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:07:05.924307 initrd-setup-root[812]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:07:05.949777 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:07:05.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.951065 systemd[1]: Starting ignition-mount.service... Feb 9 10:07:05.952197 systemd[1]: Starting sysroot-boot.service... Feb 9 10:07:05.956142 bash[829]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 10:07:05.964496 ignition[831]: INFO : Ignition 2.14.0 Feb 9 10:07:05.964496 ignition[831]: INFO : Stage: mount Feb 9 10:07:05.965660 ignition[831]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:07:05.965660 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:07:05.967149 ignition[831]: INFO : mount: mount passed Feb 9 10:07:05.967149 ignition[831]: INFO : Ignition finished successfully Feb 9 10:07:05.968540 systemd[1]: Finished ignition-mount.service. Feb 9 10:07:05.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:05.972442 systemd[1]: Finished sysroot-boot.service. Feb 9 10:07:05.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:06.538284 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:07:06.544258 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (840) Feb 9 10:07:06.544287 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:07:06.545393 kernel: BTRFS info (device vda6): using free space tree Feb 9 10:07:06.545406 kernel: BTRFS info (device vda6): has skinny extents Feb 9 10:07:06.548633 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:07:06.549919 systemd[1]: Starting ignition-files.service... Feb 9 10:07:06.563088 ignition[860]: INFO : Ignition 2.14.0 Feb 9 10:07:06.563088 ignition[860]: INFO : Stage: files Feb 9 10:07:06.564209 ignition[860]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:07:06.564209 ignition[860]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:07:06.565847 ignition[860]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:07:06.567126 ignition[860]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:07:06.567126 ignition[860]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:07:06.570606 ignition[860]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:07:06.571631 ignition[860]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:07:06.571631 ignition[860]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:07:06.571298 unknown[860]: wrote ssh authorized keys file for user: core Feb 9 10:07:06.575496 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 10:07:06.575496 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 10:07:06.809135 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:07:07.043808 ignition[860]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 10:07:07.045992 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 10:07:07.045992 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 10:07:07.045992 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:07:07.287337 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:07:07.411229 ignition[860]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 10:07:07.413365 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 10:07:07.413365 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:07:07.413365 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 10:07:07.526643 systemd-networkd[740]: eth0: Gained IPv6LL Feb 9 10:07:07.658447 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:07:07.694012 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:07:07.695462 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:07:07.695462 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:07:07.743962 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:07:08.000682 ignition[860]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 9 10:07:08.002867 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:07:08.002867 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:07:08.002867 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:07:08.032015 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 10:07:08.592968 ignition[860]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 9 10:07:08.595173 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:07:08.595173 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:07:08.595173 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 9 10:07:08.615201 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 10:07:09.015707 ignition[860]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 9 10:07:09.015707 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:07:09.019976 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:07:09.019976 ignition[860]: INFO : files: op(f): [started] processing unit "prepare-helm.service" Feb 9 10:07:09.019976 ignition[860]: INFO : files: op(f): op(10): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:07:09.019976 ignition[860]: INFO : files: op(f): op(10): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:07:09.019976 ignition[860]: INFO : files: op(f): [finished] processing unit "prepare-helm.service" Feb 9 10:07:09.019976 ignition[860]: INFO : files: op(11): [started] processing unit "coreos-metadata.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(11): op(12): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(11): op(12): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(11): [finished] processing unit "coreos-metadata.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 10:07:09.045299 ignition[860]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 10:07:09.078118 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:07:09.078142 kernel: audit: type=1130 audit(1707473229.049:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.078153 kernel: audit: type=1130 audit(1707473229.058:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.078162 kernel: audit: type=1131 audit(1707473229.058:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.078172 kernel: audit: type=1130 audit(1707473229.063:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.048718 systemd[1]: Finished ignition-files.service. Feb 9 10:07:09.078915 ignition[860]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 10:07:09.078915 ignition[860]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 10:07:09.078915 ignition[860]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:07:09.078915 ignition[860]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:07:09.078915 ignition[860]: INFO : files: files passed Feb 9 10:07:09.078915 ignition[860]: INFO : Ignition finished successfully Feb 9 10:07:09.089886 kernel: audit: type=1130 audit(1707473229.079:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.089903 kernel: audit: type=1131 audit(1707473229.079:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.050165 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:07:09.052940 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:07:09.092114 initrd-setup-root-after-ignition[884]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 10:07:09.053543 systemd[1]: Starting ignition-quench.service... Feb 9 10:07:09.093827 initrd-setup-root-after-ignition[887]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:07:09.057136 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:07:09.057210 systemd[1]: Finished ignition-quench.service. Feb 9 10:07:09.061430 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:07:09.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.099307 kernel: audit: type=1130 audit(1707473229.096:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.063482 systemd[1]: Reached target ignition-complete.target. Feb 9 10:07:09.067127 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:07:09.078799 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:07:09.078875 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:07:09.079604 systemd[1]: Reached target initrd-fs.target. Feb 9 10:07:09.084563 systemd[1]: Reached target initrd.target. Feb 9 10:07:09.085949 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:07:09.086572 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:07:09.096141 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:07:09.097520 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:07:09.104763 systemd[1]: Stopped target network.target. Feb 9 10:07:09.105756 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:07:09.106739 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:07:09.107789 systemd[1]: Stopped target timers.target. Feb 9 10:07:09.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.108753 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:07:09.112997 kernel: audit: type=1131 audit(1707473229.109:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.108849 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:07:09.109920 systemd[1]: Stopped target initrd.target. Feb 9 10:07:09.112503 systemd[1]: Stopped target basic.target. Feb 9 10:07:09.113617 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:07:09.114678 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:07:09.115704 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:07:09.116701 systemd[1]: Stopped target remote-fs.target. Feb 9 10:07:09.117727 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:07:09.118799 systemd[1]: Stopped target sysinit.target. Feb 9 10:07:09.119839 systemd[1]: Stopped target local-fs.target. Feb 9 10:07:09.120807 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:07:09.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.121949 systemd[1]: Stopped target swap.target. Feb 9 10:07:09.127022 kernel: audit: type=1131 audit(1707473229.123:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.122874 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:07:09.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.122988 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:07:09.130903 kernel: audit: type=1131 audit(1707473229.127:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.123975 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:07:09.126665 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:07:09.126762 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:07:09.127735 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:07:09.127824 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:07:09.130611 systemd[1]: Stopped target paths.target. Feb 9 10:07:09.131446 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:07:09.135282 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:07:09.136211 systemd[1]: Stopped target slices.target. Feb 9 10:07:09.137210 systemd[1]: Stopped target sockets.target. Feb 9 10:07:09.138369 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:07:09.138437 systemd[1]: Closed iscsid.socket. Feb 9 10:07:09.139269 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:07:09.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.139333 systemd[1]: Closed iscsiuio.socket. Feb 9 10:07:09.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.140293 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:07:09.140391 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:07:09.141459 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:07:09.141549 systemd[1]: Stopped ignition-files.service. Feb 9 10:07:09.143179 systemd[1]: Stopping ignition-mount.service... Feb 9 10:07:09.144695 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:07:09.145927 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:07:09.149799 ignition[900]: INFO : Ignition 2.14.0 Feb 9 10:07:09.149799 ignition[900]: INFO : Stage: umount Feb 9 10:07:09.149799 ignition[900]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:07:09.149799 ignition[900]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:07:09.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.150467 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:07:09.156202 ignition[900]: INFO : umount: umount passed Feb 9 10:07:09.156202 ignition[900]: INFO : Ignition finished successfully Feb 9 10:07:09.151103 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:07:09.151213 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:07:09.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.152355 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:07:09.152446 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:07:09.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.153423 systemd-networkd[740]: eth0: DHCPv6 lease lost Feb 9 10:07:09.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.157164 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:07:09.161000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:07:09.157852 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:07:09.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.157958 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:07:09.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.159145 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:07:09.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.159213 systemd[1]: Stopped ignition-mount.service. Feb 9 10:07:09.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.160961 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:07:09.161026 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:07:09.162067 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:07:09.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.162121 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:07:09.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.162707 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:07:09.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.162750 systemd[1]: Stopped ignition-disks.service. Feb 9 10:07:09.163827 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:07:09.163860 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:07:09.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.164911 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:07:09.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.164943 systemd[1]: Stopped ignition-setup.service. Feb 9 10:07:09.165892 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:07:09.165928 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:07:09.167586 systemd[1]: Stopping network-cleanup.service... Feb 9 10:07:09.180000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:07:09.168576 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:07:09.168623 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:07:09.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.169637 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:07:09.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.169670 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:07:09.171215 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:07:09.171268 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:07:09.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.172159 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:07:09.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.176108 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:07:09.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.176567 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:07:09.176647 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:07:09.177877 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:07:09.177968 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:07:09.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.182560 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:07:09.182668 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:07:09.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.184073 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:07:09.184146 systemd[1]: Stopped network-cleanup.service. Feb 9 10:07:09.185137 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:07:09.185168 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:07:09.186233 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:07:09.186282 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:07:09.187182 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:07:09.187219 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:07:09.188338 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:07:09.188370 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:07:09.189455 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:07:09.189495 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:07:09.191123 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:07:09.191790 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 10:07:09.191852 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 10:07:09.193602 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:07:09.193640 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:07:09.194379 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:07:09.194416 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:07:09.196348 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 10:07:09.196723 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:07:09.196798 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:07:09.197760 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:07:09.199353 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:07:09.205233 systemd[1]: Switching root. Feb 9 10:07:09.222580 iscsid[746]: iscsid shutting down. Feb 9 10:07:09.223200 systemd-journald[290]: Journal stopped Feb 9 10:07:11.295928 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Feb 9 10:07:11.295988 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:07:11.296002 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:07:11.296013 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:07:11.296022 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:07:11.296032 kernel: SELinux: policy capability open_perms=1 Feb 9 10:07:11.296044 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:07:11.296054 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:07:11.296063 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:07:11.296072 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:07:11.296082 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:07:11.296091 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:07:11.296101 systemd[1]: Successfully loaded SELinux policy in 30.774ms. Feb 9 10:07:11.296118 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.676ms. Feb 9 10:07:11.296134 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:07:11.296146 systemd[1]: Detected virtualization kvm. Feb 9 10:07:11.296157 systemd[1]: Detected architecture arm64. Feb 9 10:07:11.296167 systemd[1]: Detected first boot. Feb 9 10:07:11.296178 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:07:11.296188 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:07:11.296199 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:07:11.296209 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:07:11.296223 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:07:11.296235 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:07:11.296261 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:07:11.296272 systemd[1]: Stopped iscsiuio.service. Feb 9 10:07:11.296282 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:07:11.296298 systemd[1]: Stopped iscsid.service. Feb 9 10:07:11.296311 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:07:11.296326 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:07:11.296338 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:07:11.296348 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:07:11.296359 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:07:11.296369 systemd[1]: Created slice system-getty.slice. Feb 9 10:07:11.296380 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:07:11.296391 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:07:11.296402 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:07:11.296412 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:07:11.296424 systemd[1]: Created slice user.slice. Feb 9 10:07:11.296435 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:07:11.296446 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:07:11.296456 systemd[1]: Set up automount boot.automount. Feb 9 10:07:11.296467 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:07:11.296477 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:07:11.296489 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:07:11.296500 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:07:11.296512 systemd[1]: Reached target integritysetup.target. Feb 9 10:07:11.296522 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:07:11.296533 systemd[1]: Reached target remote-fs.target. Feb 9 10:07:11.296544 systemd[1]: Reached target slices.target. Feb 9 10:07:11.296554 systemd[1]: Reached target swap.target. Feb 9 10:07:11.296565 systemd[1]: Reached target torcx.target. Feb 9 10:07:11.296575 systemd[1]: Reached target veritysetup.target. Feb 9 10:07:11.296586 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:07:11.296597 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:07:11.296608 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:07:11.296619 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:07:11.296629 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:07:11.296640 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:07:11.296651 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:07:11.296662 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:07:11.296672 systemd[1]: Mounting media.mount... Feb 9 10:07:11.296683 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:07:11.296694 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:07:11.296704 systemd[1]: Mounting tmp.mount... Feb 9 10:07:11.296717 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:07:11.296727 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:07:11.296738 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:07:11.296748 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:07:11.296759 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:07:11.296770 systemd[1]: Starting modprobe@drm.service... Feb 9 10:07:11.296780 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:07:11.296790 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:07:11.296801 systemd[1]: Starting modprobe@loop.service... Feb 9 10:07:11.296813 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:07:11.296824 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:07:11.296835 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:07:11.296845 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:07:11.296856 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:07:11.296867 systemd[1]: Stopped systemd-journald.service. Feb 9 10:07:11.296883 systemd[1]: Starting systemd-journald.service... Feb 9 10:07:11.296895 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:07:11.296906 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:07:11.296918 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:07:11.296929 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:07:11.296939 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:07:11.296951 systemd[1]: Stopped verity-setup.service. Feb 9 10:07:11.296961 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:07:11.296972 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:07:11.296982 kernel: loop: module loaded Feb 9 10:07:11.296992 systemd[1]: Mounted media.mount. Feb 9 10:07:11.297002 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:07:11.297014 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:07:11.297027 systemd-journald[989]: Journal started Feb 9 10:07:11.297069 systemd-journald[989]: Runtime Journal (/run/log/journal/f0769b99536446778066d457cc4f5ae7) is 6.0M, max 48.7M, 42.6M free. Feb 9 10:07:09.283000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:07:09.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:07:09.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:07:09.473000 audit: BPF prog-id=10 op=LOAD Feb 9 10:07:09.473000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:07:09.473000 audit: BPF prog-id=11 op=LOAD Feb 9 10:07:09.473000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:07:09.508000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:07:09.508000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000098562 a1=400008c618 a2=400009ca00 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:09.508000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:07:09.509000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:07:09.509000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000098639 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:09.509000 audit: CWD cwd="/" Feb 9 10:07:09.509000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:07:09.509000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:07:09.509000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:07:11.163000 audit: BPF prog-id=12 op=LOAD Feb 9 10:07:11.163000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:07:11.163000 audit: BPF prog-id=13 op=LOAD Feb 9 10:07:11.163000 audit: BPF prog-id=14 op=LOAD Feb 9 10:07:11.163000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:07:11.163000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:07:11.164000 audit: BPF prog-id=15 op=LOAD Feb 9 10:07:11.164000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:07:11.164000 audit: BPF prog-id=16 op=LOAD Feb 9 10:07:11.164000 audit: BPF prog-id=17 op=LOAD Feb 9 10:07:11.164000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:07:11.164000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:07:11.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.179000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:07:11.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.262000 audit: BPF prog-id=18 op=LOAD Feb 9 10:07:11.267000 audit: BPF prog-id=19 op=LOAD Feb 9 10:07:11.267000 audit: BPF prog-id=20 op=LOAD Feb 9 10:07:11.267000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:07:11.267000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:07:11.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.294000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:07:11.294000 audit[989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffff7611250 a2=4000 a3=1 items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:11.294000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:07:11.162572 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:07:09.507314 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:07:11.162582 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 10:07:09.507805 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:07:11.298475 kernel: fuse: init (API version 7.34) Feb 9 10:07:11.165992 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:07:09.507826 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:07:09.507856 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:07:09.507866 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:07:09.507906 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:07:09.507918 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:07:09.508138 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:07:11.299275 systemd[1]: Started systemd-journald.service. Feb 9 10:07:09.508189 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:07:09.508202 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:07:09.508646 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:07:09.508690 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:07:09.508708 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:07:09.508723 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:07:09.508748 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:07:11.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:09.508761 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:07:10.921531 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:07:10.921784 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:07:10.921889 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:07:10.922043 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:07:10.922090 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:07:10.922143 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-02-09T10:07:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:07:11.300322 systemd[1]: Mounted tmp.mount. Feb 9 10:07:11.301176 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:07:11.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.302126 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:07:11.302574 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:07:11.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.303557 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:07:11.303722 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:07:11.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.304768 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:07:11.306402 systemd[1]: Finished modprobe@drm.service. Feb 9 10:07:11.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.307364 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:07:11.307510 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:07:11.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.308526 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:07:11.308676 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:07:11.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.309735 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:07:11.309891 systemd[1]: Finished modprobe@loop.service. Feb 9 10:07:11.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.310902 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:07:11.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.312085 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:07:11.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.313075 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:07:11.314196 systemd[1]: Reached target network-pre.target. Feb 9 10:07:11.315808 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:07:11.317514 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:07:11.318063 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:07:11.319841 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:07:11.321975 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:07:11.324381 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:07:11.325372 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:07:11.326080 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:07:11.327179 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:07:11.328585 systemd-journald[989]: Time spent on flushing to /var/log/journal/f0769b99536446778066d457cc4f5ae7 is 15.953ms for 1023 entries. Feb 9 10:07:11.328585 systemd-journald[989]: System Journal (/var/log/journal/f0769b99536446778066d457cc4f5ae7) is 8.0M, max 195.6M, 187.6M free. Feb 9 10:07:11.360164 systemd-journald[989]: Received client request to flush runtime journal. Feb 9 10:07:11.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.330829 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:07:11.361227 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 10:07:11.331778 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:07:11.337461 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:07:11.339481 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:07:11.341672 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:07:11.342628 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:07:11.343487 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:07:11.349779 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:07:11.351514 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:07:11.361005 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:07:11.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.367687 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:07:11.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.369548 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:07:11.383922 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:07:11.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.680868 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:07:11.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.682000 audit: BPF prog-id=21 op=LOAD Feb 9 10:07:11.682000 audit: BPF prog-id=22 op=LOAD Feb 9 10:07:11.682000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:07:11.682000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:07:11.683059 systemd[1]: Starting systemd-udevd.service... Feb 9 10:07:11.703329 systemd-udevd[1037]: Using default interface naming scheme 'v252'. Feb 9 10:07:11.718446 systemd[1]: Started systemd-udevd.service. Feb 9 10:07:11.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.720000 audit: BPF prog-id=23 op=LOAD Feb 9 10:07:11.722143 systemd[1]: Starting systemd-networkd.service... Feb 9 10:07:11.732931 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 10:07:11.738000 audit: BPF prog-id=24 op=LOAD Feb 9 10:07:11.738000 audit: BPF prog-id=25 op=LOAD Feb 9 10:07:11.738000 audit: BPF prog-id=26 op=LOAD Feb 9 10:07:11.739605 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:07:11.779100 systemd[1]: Started systemd-userdbd.service. Feb 9 10:07:11.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.788934 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:07:11.808592 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:07:11.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.810486 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:07:11.829388 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:07:11.836974 systemd-networkd[1047]: lo: Link UP Feb 9 10:07:11.836985 systemd-networkd[1047]: lo: Gained carrier Feb 9 10:07:11.837333 systemd-networkd[1047]: Enumeration completed Feb 9 10:07:11.837453 systemd[1]: Started systemd-networkd.service. Feb 9 10:07:11.837547 systemd-networkd[1047]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:07:11.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.843580 systemd-networkd[1047]: eth0: Link UP Feb 9 10:07:11.843591 systemd-networkd[1047]: eth0: Gained carrier Feb 9 10:07:11.860029 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:07:11.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.860789 systemd[1]: Reached target cryptsetup.target. Feb 9 10:07:11.861359 systemd-networkd[1047]: eth0: DHCPv4 address 10.0.0.126/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 10:07:11.862446 systemd[1]: Starting lvm2-activation.service... Feb 9 10:07:11.865865 lvm[1072]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:07:11.897994 systemd[1]: Finished lvm2-activation.service. Feb 9 10:07:11.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.898738 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:07:11.899363 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:07:11.899392 systemd[1]: Reached target local-fs.target. Feb 9 10:07:11.899929 systemd[1]: Reached target machines.target. Feb 9 10:07:11.901569 systemd[1]: Starting ldconfig.service... Feb 9 10:07:11.902622 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:07:11.902676 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:07:11.903828 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:07:11.905690 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:07:11.907730 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:07:11.911419 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:07:11.911477 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:07:11.912596 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:07:11.913763 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1074 (bootctl) Feb 9 10:07:11.917427 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:07:11.921083 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:07:11.925287 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:07:11.927465 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:07:11.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:11.928929 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:07:12.014521 systemd-fsck[1082]: fsck.fat 4.2 (2021-01-31) Feb 9 10:07:12.014521 systemd-fsck[1082]: /dev/vda1: 236 files, 113719/258078 clusters Feb 9 10:07:12.016411 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:07:12.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.026162 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:07:12.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.082658 ldconfig[1073]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:07:12.086476 systemd[1]: Finished ldconfig.service. Feb 9 10:07:12.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.291800 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:07:12.293221 systemd[1]: Mounting boot.mount... Feb 9 10:07:12.299539 systemd[1]: Mounted boot.mount. Feb 9 10:07:12.306642 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:07:12.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.356896 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:07:12.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.358936 systemd[1]: Starting audit-rules.service... Feb 9 10:07:12.360573 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:07:12.363000 audit: BPF prog-id=27 op=LOAD Feb 9 10:07:12.362362 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:07:12.365987 systemd[1]: Starting systemd-resolved.service... Feb 9 10:07:12.367000 audit: BPF prog-id=28 op=LOAD Feb 9 10:07:12.368315 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:07:12.370125 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:07:12.371319 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:07:12.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.372633 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:07:12.374000 audit[1096]: SYSTEM_BOOT pid=1096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.378641 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:07:12.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.379791 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:07:12.381992 systemd[1]: Starting systemd-update-done.service... Feb 9 10:07:12.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.387251 systemd[1]: Finished systemd-update-done.service. Feb 9 10:07:12.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:12.398000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:07:12.398000 audit[1107]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcc728c20 a2=420 a3=0 items=0 ppid=1085 pid=1107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:12.398000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:07:12.399286 augenrules[1107]: No rules Feb 9 10:07:12.399901 systemd[1]: Finished audit-rules.service. Feb 9 10:07:12.413970 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:07:12.414666 systemd-timesyncd[1095]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 10:07:12.414717 systemd-timesyncd[1095]: Initial clock synchronization to Fri 2024-02-09 10:07:12.028948 UTC. Feb 9 10:07:12.415065 systemd[1]: Reached target time-set.target. Feb 9 10:07:12.419190 systemd-resolved[1094]: Positive Trust Anchors: Feb 9 10:07:12.419445 systemd-resolved[1094]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:07:12.419529 systemd-resolved[1094]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:07:12.430740 systemd-resolved[1094]: Defaulting to hostname 'linux'. Feb 9 10:07:12.432186 systemd[1]: Started systemd-resolved.service. Feb 9 10:07:12.432892 systemd[1]: Reached target network.target. Feb 9 10:07:12.433465 systemd[1]: Reached target nss-lookup.target. Feb 9 10:07:12.434030 systemd[1]: Reached target sysinit.target. Feb 9 10:07:12.434662 systemd[1]: Started motdgen.path. Feb 9 10:07:12.435182 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:07:12.436130 systemd[1]: Started logrotate.timer. Feb 9 10:07:12.436940 systemd[1]: Started mdadm.timer. Feb 9 10:07:12.437554 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:07:12.438353 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:07:12.438386 systemd[1]: Reached target paths.target. Feb 9 10:07:12.439082 systemd[1]: Reached target timers.target. Feb 9 10:07:12.440135 systemd[1]: Listening on dbus.socket. Feb 9 10:07:12.441838 systemd[1]: Starting docker.socket... Feb 9 10:07:12.444864 systemd[1]: Listening on sshd.socket. Feb 9 10:07:12.445676 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:07:12.446103 systemd[1]: Listening on docker.socket. Feb 9 10:07:12.446909 systemd[1]: Reached target sockets.target. Feb 9 10:07:12.447657 systemd[1]: Reached target basic.target. Feb 9 10:07:12.448404 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:07:12.448433 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:07:12.449418 systemd[1]: Starting containerd.service... Feb 9 10:07:12.451043 systemd[1]: Starting dbus.service... Feb 9 10:07:12.452643 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:07:12.454503 systemd[1]: Starting extend-filesystems.service... Feb 9 10:07:12.455591 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:07:12.457389 systemd[1]: Starting motdgen.service... Feb 9 10:07:12.460404 jq[1117]: false Feb 9 10:07:12.461488 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:07:12.463223 systemd[1]: Starting prepare-critools.service... Feb 9 10:07:12.465420 systemd[1]: Starting prepare-helm.service... Feb 9 10:07:12.467313 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:07:12.469382 systemd[1]: Starting sshd-keygen.service... Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda1 Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda2 Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda3 Feb 9 10:07:12.472266 extend-filesystems[1118]: Found usr Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda4 Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda6 Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda7 Feb 9 10:07:12.472266 extend-filesystems[1118]: Found vda9 Feb 9 10:07:12.472266 extend-filesystems[1118]: Checking size of /dev/vda9 Feb 9 10:07:12.473165 systemd[1]: Starting systemd-logind.service... Feb 9 10:07:12.474284 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:07:12.474343 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:07:12.474737 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:07:12.475588 systemd[1]: Starting update-engine.service... Feb 9 10:07:12.485131 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:07:12.489001 jq[1137]: true Feb 9 10:07:12.487708 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:07:12.487888 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:07:12.490090 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:07:12.490313 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:07:12.500821 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:07:12.500983 systemd[1]: Finished motdgen.service. Feb 9 10:07:12.506668 dbus-daemon[1116]: [system] SELinux support is enabled Feb 9 10:07:12.507145 tar[1142]: ./ Feb 9 10:07:12.507145 tar[1142]: ./loopback Feb 9 10:07:12.506915 systemd[1]: Started dbus.service. Feb 9 10:07:12.509224 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:07:12.510342 tar[1144]: linux-arm64/helm Feb 9 10:07:12.509267 systemd[1]: Reached target system-config.target. Feb 9 10:07:12.510612 tar[1143]: crictl Feb 9 10:07:12.509905 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:07:12.509921 systemd[1]: Reached target user-config.target. Feb 9 10:07:12.511119 jq[1145]: true Feb 9 10:07:12.528928 extend-filesystems[1118]: Resized partition /dev/vda9 Feb 9 10:07:12.538814 systemd-logind[1132]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 10:07:12.540724 systemd-logind[1132]: New seat seat0. Feb 9 10:07:12.543930 systemd[1]: Started systemd-logind.service. Feb 9 10:07:12.556777 bash[1168]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:07:12.557754 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:07:12.562071 extend-filesystems[1161]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 10:07:12.577270 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 10:07:12.598264 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 10:07:12.610133 update_engine[1134]: I0209 10:07:12.609874 1134 main.cc:92] Flatcar Update Engine starting Feb 9 10:07:12.610415 extend-filesystems[1161]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 10:07:12.610415 extend-filesystems[1161]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 10:07:12.610415 extend-filesystems[1161]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 10:07:12.613660 extend-filesystems[1118]: Resized filesystem in /dev/vda9 Feb 9 10:07:12.610892 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:07:12.611050 systemd[1]: Finished extend-filesystems.service. Feb 9 10:07:12.616789 systemd[1]: Started update-engine.service. Feb 9 10:07:12.616963 update_engine[1134]: I0209 10:07:12.616943 1134 update_check_scheduler.cc:74] Next update check in 10m28s Feb 9 10:07:12.619106 systemd[1]: Started locksmithd.service. Feb 9 10:07:12.622864 tar[1142]: ./bandwidth Feb 9 10:07:12.645705 env[1146]: time="2024-02-09T10:07:12.645654760Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:07:12.668291 tar[1142]: ./ptp Feb 9 10:07:12.699662 tar[1142]: ./vlan Feb 9 10:07:12.709968 env[1146]: time="2024-02-09T10:07:12.709921400Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:07:12.712778 env[1146]: time="2024-02-09T10:07:12.712752680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718300280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718331240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718560520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718578520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718591160Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718600840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718673880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718847160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.718991400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:07:12.719210 env[1146]: time="2024-02-09T10:07:12.719008160Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:07:12.719481 env[1146]: time="2024-02-09T10:07:12.719064880Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:07:12.719481 env[1146]: time="2024-02-09T10:07:12.719076840Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723471880Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723501640Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723515440Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723572040Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723588320Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723602880Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.723672480Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724043160Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724080200Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724093920Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724106560Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724119520Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724279400Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:07:12.725487 env[1146]: time="2024-02-09T10:07:12.724370240Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724637960Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724672400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724687320Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724807280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724821480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724833560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724844440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724855680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724891480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724905280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724917640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.724930400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.725075920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.725101760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.725791 env[1146]: time="2024-02-09T10:07:12.725114600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.726064 env[1146]: time="2024-02-09T10:07:12.725126240Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:07:12.726064 env[1146]: time="2024-02-09T10:07:12.725139680Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:07:12.726064 env[1146]: time="2024-02-09T10:07:12.725150200Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:07:12.726064 env[1146]: time="2024-02-09T10:07:12.725165800Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:07:12.726064 env[1146]: time="2024-02-09T10:07:12.725207360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:07:12.726157 env[1146]: time="2024-02-09T10:07:12.725428320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:07:12.728975 env[1146]: time="2024-02-09T10:07:12.726517680Z" level=info msg="Connect containerd service" Feb 9 10:07:12.728975 env[1146]: time="2024-02-09T10:07:12.726565280Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729218840Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729405400Z" level=info msg="Start subscribing containerd event" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729511320Z" level=info msg="Start recovering state" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729567680Z" level=info msg="Start event monitor" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729583720Z" level=info msg="Start snapshots syncer" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729593760Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.729600680Z" level=info msg="Start streaming server" Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.730035600Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:07:12.730409 env[1146]: time="2024-02-09T10:07:12.730120920Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:07:12.730286 systemd[1]: Started containerd.service. Feb 9 10:07:12.739800 env[1146]: time="2024-02-09T10:07:12.739770440Z" level=info msg="containerd successfully booted in 0.095773s" Feb 9 10:07:12.750990 tar[1142]: ./host-device Feb 9 10:07:12.778997 tar[1142]: ./tuning Feb 9 10:07:12.804878 tar[1142]: ./vrf Feb 9 10:07:12.831286 tar[1142]: ./sbr Feb 9 10:07:12.856985 tar[1142]: ./tap Feb 9 10:07:12.883879 systemd[1]: Finished prepare-critools.service. Feb 9 10:07:12.889820 tar[1142]: ./dhcp Feb 9 10:07:12.961880 tar[1142]: ./static Feb 9 10:07:12.966719 locksmithd[1175]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:07:12.984046 tar[1144]: linux-arm64/LICENSE Feb 9 10:07:12.984124 tar[1144]: linux-arm64/README.md Feb 9 10:07:12.984769 tar[1142]: ./firewall Feb 9 10:07:12.987943 systemd[1]: Finished prepare-helm.service. Feb 9 10:07:13.016368 tar[1142]: ./macvlan Feb 9 10:07:13.043949 tar[1142]: ./dummy Feb 9 10:07:13.071063 tar[1142]: ./bridge Feb 9 10:07:13.100615 tar[1142]: ./ipvlan Feb 9 10:07:13.127784 tar[1142]: ./portmap Feb 9 10:07:13.153600 tar[1142]: ./host-local Feb 9 10:07:13.185335 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:07:13.734340 systemd-networkd[1047]: eth0: Gained IPv6LL Feb 9 10:07:14.146248 sshd_keygen[1136]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:07:14.162341 systemd[1]: Finished sshd-keygen.service. Feb 9 10:07:14.164222 systemd[1]: Starting issuegen.service... Feb 9 10:07:14.168378 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:07:14.168516 systemd[1]: Finished issuegen.service. Feb 9 10:07:14.170341 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:07:14.175526 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:07:14.177298 systemd[1]: Started getty@tty1.service. Feb 9 10:07:14.178919 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 10:07:14.179711 systemd[1]: Reached target getty.target. Feb 9 10:07:14.180349 systemd[1]: Reached target multi-user.target. Feb 9 10:07:14.181938 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:07:14.187543 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:07:14.187676 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:07:14.188441 systemd[1]: Startup finished in 564ms (kernel) + 5.666s (initrd) + 4.941s (userspace) = 11.173s. Feb 9 10:07:15.972875 systemd[1]: Created slice system-sshd.slice. Feb 9 10:07:15.973908 systemd[1]: Started sshd@0-10.0.0.126:22-10.0.0.1:54402.service. Feb 9 10:07:16.016961 sshd[1205]: Accepted publickey for core from 10.0.0.1 port 54402 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.018975 sshd[1205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.026845 systemd-logind[1132]: New session 1 of user core. Feb 9 10:07:16.027648 systemd[1]: Created slice user-500.slice. Feb 9 10:07:16.028597 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:07:16.035689 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:07:16.036854 systemd[1]: Starting user@500.service... Feb 9 10:07:16.039161 (systemd)[1208]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.092739 systemd[1208]: Queued start job for default target default.target. Feb 9 10:07:16.093160 systemd[1208]: Reached target paths.target. Feb 9 10:07:16.093179 systemd[1208]: Reached target sockets.target. Feb 9 10:07:16.093190 systemd[1208]: Reached target timers.target. Feb 9 10:07:16.093201 systemd[1208]: Reached target basic.target. Feb 9 10:07:16.093270 systemd[1208]: Reached target default.target. Feb 9 10:07:16.093295 systemd[1208]: Startup finished in 49ms. Feb 9 10:07:16.093468 systemd[1]: Started user@500.service. Feb 9 10:07:16.094337 systemd[1]: Started session-1.scope. Feb 9 10:07:16.142700 systemd[1]: Started sshd@1-10.0.0.126:22-10.0.0.1:54416.service. Feb 9 10:07:16.178500 sshd[1217]: Accepted publickey for core from 10.0.0.1 port 54416 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.179538 sshd[1217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.182792 systemd-logind[1132]: New session 2 of user core. Feb 9 10:07:16.183557 systemd[1]: Started session-2.scope. Feb 9 10:07:16.238411 sshd[1217]: pam_unix(sshd:session): session closed for user core Feb 9 10:07:16.241938 systemd[1]: Started sshd@2-10.0.0.126:22-10.0.0.1:54424.service. Feb 9 10:07:16.242335 systemd[1]: sshd@1-10.0.0.126:22-10.0.0.1:54416.service: Deactivated successfully. Feb 9 10:07:16.243223 systemd-logind[1132]: Session 2 logged out. Waiting for processes to exit. Feb 9 10:07:16.243233 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 10:07:16.244045 systemd-logind[1132]: Removed session 2. Feb 9 10:07:16.277164 sshd[1222]: Accepted publickey for core from 10.0.0.1 port 54424 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.278210 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.281317 systemd-logind[1132]: New session 3 of user core. Feb 9 10:07:16.281667 systemd[1]: Started session-3.scope. Feb 9 10:07:16.327968 sshd[1222]: pam_unix(sshd:session): session closed for user core Feb 9 10:07:16.330221 systemd[1]: sshd@2-10.0.0.126:22-10.0.0.1:54424.service: Deactivated successfully. Feb 9 10:07:16.330748 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 10:07:16.331182 systemd-logind[1132]: Session 3 logged out. Waiting for processes to exit. Feb 9 10:07:16.332123 systemd[1]: Started sshd@3-10.0.0.126:22-10.0.0.1:54436.service. Feb 9 10:07:16.332718 systemd-logind[1132]: Removed session 3. Feb 9 10:07:16.366944 sshd[1229]: Accepted publickey for core from 10.0.0.1 port 54436 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.367908 sshd[1229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.370512 systemd-logind[1132]: New session 4 of user core. Feb 9 10:07:16.371215 systemd[1]: Started session-4.scope. Feb 9 10:07:16.420779 sshd[1229]: pam_unix(sshd:session): session closed for user core Feb 9 10:07:16.423018 systemd[1]: sshd@3-10.0.0.126:22-10.0.0.1:54436.service: Deactivated successfully. Feb 9 10:07:16.423592 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:07:16.424045 systemd-logind[1132]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:07:16.425029 systemd[1]: Started sshd@4-10.0.0.126:22-10.0.0.1:54452.service. Feb 9 10:07:16.425624 systemd-logind[1132]: Removed session 4. Feb 9 10:07:16.462507 sshd[1235]: Accepted publickey for core from 10.0.0.1 port 54452 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.463826 sshd[1235]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.467365 systemd[1]: Started session-5.scope. Feb 9 10:07:16.467479 systemd-logind[1132]: New session 5 of user core. Feb 9 10:07:16.523742 sudo[1238]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:07:16.524700 sudo[1238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:07:16.535444 dbus-daemon[1116]: avc: received setenforce notice (enforcing=1) Feb 9 10:07:16.537077 sudo[1238]: pam_unix(sudo:session): session closed for user root Feb 9 10:07:16.538779 sshd[1235]: pam_unix(sshd:session): session closed for user core Feb 9 10:07:16.541149 systemd[1]: sshd@4-10.0.0.126:22-10.0.0.1:54452.service: Deactivated successfully. Feb 9 10:07:16.541690 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:07:16.542158 systemd-logind[1132]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:07:16.543093 systemd[1]: Started sshd@5-10.0.0.126:22-10.0.0.1:54454.service. Feb 9 10:07:16.543633 systemd-logind[1132]: Removed session 5. Feb 9 10:07:16.578780 sshd[1242]: Accepted publickey for core from 10.0.0.1 port 54454 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.580075 sshd[1242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.582799 systemd-logind[1132]: New session 6 of user core. Feb 9 10:07:16.583513 systemd[1]: Started session-6.scope. Feb 9 10:07:16.632378 sudo[1246]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:07:16.632562 sudo[1246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:07:16.634907 sudo[1246]: pam_unix(sudo:session): session closed for user root Feb 9 10:07:16.638747 sudo[1245]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:07:16.638934 sudo[1245]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:07:16.646470 systemd[1]: Stopping audit-rules.service... Feb 9 10:07:16.646000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:07:16.647435 auditctl[1249]: No rules Feb 9 10:07:16.647670 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:07:16.647809 systemd[1]: Stopped audit-rules.service. Feb 9 10:07:16.649125 kernel: kauditd_printk_skb: 132 callbacks suppressed Feb 9 10:07:16.649184 kernel: audit: type=1305 audit(1707473236.646:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:07:16.649205 kernel: audit: type=1300 audit(1707473236.646:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff7768c30 a2=420 a3=0 items=0 ppid=1 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:16.646000 audit[1249]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff7768c30 a2=420 a3=0 items=0 ppid=1 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:16.649059 systemd[1]: Starting audit-rules.service... Feb 9 10:07:16.646000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:07:16.652267 kernel: audit: type=1327 audit(1707473236.646:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:07:16.652296 kernel: audit: type=1131 audit(1707473236.646:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.663230 augenrules[1266]: No rules Feb 9 10:07:16.663824 systemd[1]: Finished audit-rules.service. Feb 9 10:07:16.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.664837 sudo[1245]: pam_unix(sudo:session): session closed for user root Feb 9 10:07:16.663000 audit[1245]: USER_END pid=1245 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.666024 sshd[1242]: pam_unix(sshd:session): session closed for user core Feb 9 10:07:16.669282 kernel: audit: type=1130 audit(1707473236.662:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.669334 kernel: audit: type=1106 audit(1707473236.663:168): pid=1245 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.669356 kernel: audit: type=1104 audit(1707473236.663:169): pid=1245 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.663000 audit[1245]: CRED_DISP pid=1245 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.669006 systemd[1]: Started sshd@6-10.0.0.126:22-10.0.0.1:54458.service. Feb 9 10:07:16.670418 kernel: audit: type=1106 audit(1707473236.667:170): pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.667000 audit[1242]: USER_END pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.670187 systemd-logind[1132]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:07:16.670354 systemd[1]: sshd@5-10.0.0.126:22-10.0.0.1:54454.service: Deactivated successfully. Feb 9 10:07:16.670879 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:07:16.671604 systemd-logind[1132]: Removed session 6. Feb 9 10:07:16.672633 kernel: audit: type=1104 audit(1707473236.667:171): pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.667000 audit[1242]: CRED_DISP pid=1242 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.674549 kernel: audit: type=1130 audit(1707473236.667:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.126:22-10.0.0.1:54458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.126:22-10.0.0.1:54458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.126:22-10.0.0.1:54454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.703000 audit[1271]: USER_ACCT pid=1271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.704390 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 54458 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:07:16.703000 audit[1271]: CRED_ACQ pid=1271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.703000 audit[1271]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9b60070 a2=3 a3=1 items=0 ppid=1 pid=1271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:16.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:07:16.705328 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:07:16.708424 systemd-logind[1132]: New session 7 of user core. Feb 9 10:07:16.708711 systemd[1]: Started session-7.scope. Feb 9 10:07:16.710000 audit[1271]: USER_START pid=1271 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.712000 audit[1274]: CRED_ACQ pid=1274 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:16.758038 sudo[1275]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:07:16.756000 audit[1275]: USER_ACCT pid=1275 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.756000 audit[1275]: CRED_REFR pid=1275 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:16.758254 sudo[1275]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:07:16.758000 audit[1275]: USER_START pid=1275 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:17.310193 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:07:17.317298 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:07:17.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:17.318015 systemd[1]: Reached target network-online.target. Feb 9 10:07:17.319523 systemd[1]: Starting docker.service... Feb 9 10:07:17.394649 env[1293]: time="2024-02-09T10:07:17.394605120Z" level=info msg="Starting up" Feb 9 10:07:17.396752 env[1293]: time="2024-02-09T10:07:17.396720643Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:07:17.396752 env[1293]: time="2024-02-09T10:07:17.396742294Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:07:17.396845 env[1293]: time="2024-02-09T10:07:17.396763205Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:07:17.396845 env[1293]: time="2024-02-09T10:07:17.396772923Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:07:17.398637 env[1293]: time="2024-02-09T10:07:17.398604931Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:07:17.398637 env[1293]: time="2024-02-09T10:07:17.398629224Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:07:17.398713 env[1293]: time="2024-02-09T10:07:17.398642984Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:07:17.398713 env[1293]: time="2024-02-09T10:07:17.398653168Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:07:17.611900 env[1293]: time="2024-02-09T10:07:17.611810331Z" level=info msg="Loading containers: start." Feb 9 10:07:17.646000 audit[1328]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.646000 audit[1328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe299b180 a2=0 a3=1 items=0 ppid=1293 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 10:07:17.648000 audit[1330]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.648000 audit[1330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcbb85d50 a2=0 a3=1 items=0 ppid=1293 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 10:07:17.649000 audit[1332]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.649000 audit[1332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdddd39f0 a2=0 a3=1 items=0 ppid=1293 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:07:17.651000 audit[1334]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.651000 audit[1334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffca57e050 a2=0 a3=1 items=0 ppid=1293 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:07:17.653000 audit[1336]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.653000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6df1e20 a2=0 a3=1 items=0 ppid=1293 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 10:07:17.674000 audit[1341]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.674000 audit[1341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd65f92c0 a2=0 a3=1 items=0 ppid=1293 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 10:07:17.680000 audit[1343]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.680000 audit[1343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0c975c0 a2=0 a3=1 items=0 ppid=1293 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.680000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 10:07:17.681000 audit[1345]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.681000 audit[1345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffddc61850 a2=0 a3=1 items=0 ppid=1293 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 10:07:17.683000 audit[1347]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.683000 audit[1347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff4e4a2f0 a2=0 a3=1 items=0 ppid=1293 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.683000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:07:17.688000 audit[1351]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.688000 audit[1351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff7f78f60 a2=0 a3=1 items=0 ppid=1293 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:07:17.689000 audit[1352]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.689000 audit[1352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffebdbef90 a2=0 a3=1 items=0 ppid=1293 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:07:17.696256 kernel: Initializing XFRM netlink socket Feb 9 10:07:17.716565 env[1293]: time="2024-02-09T10:07:17.716527073Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 10:07:17.728000 audit[1360]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.728000 audit[1360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffffefa1040 a2=0 a3=1 items=0 ppid=1293 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 10:07:17.744000 audit[1363]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.744000 audit[1363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd28d7c40 a2=0 a3=1 items=0 ppid=1293 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 10:07:17.747000 audit[1366]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.747000 audit[1366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffdbcf8880 a2=0 a3=1 items=0 ppid=1293 pid=1366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 10:07:17.748000 audit[1368]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.748000 audit[1368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe4aa6200 a2=0 a3=1 items=0 ppid=1293 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 10:07:17.750000 audit[1370]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.750000 audit[1370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff6143600 a2=0 a3=1 items=0 ppid=1293 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 10:07:17.751000 audit[1372]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.751000 audit[1372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd0fcac40 a2=0 a3=1 items=0 ppid=1293 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 10:07:17.753000 audit[1374]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.753000 audit[1374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff7ea0710 a2=0 a3=1 items=0 ppid=1293 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 10:07:17.759000 audit[1377]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.759000 audit[1377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc49a8fe0 a2=0 a3=1 items=0 ppid=1293 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 10:07:17.760000 audit[1379]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.760000 audit[1379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc3554640 a2=0 a3=1 items=0 ppid=1293 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:07:17.762000 audit[1381]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.762000 audit[1381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffeb975fb0 a2=0 a3=1 items=0 ppid=1293 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:07:17.763000 audit[1383]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.763000 audit[1383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc7442df0 a2=0 a3=1 items=0 ppid=1293 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 10:07:17.765488 systemd-networkd[1047]: docker0: Link UP Feb 9 10:07:17.771000 audit[1387]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.771000 audit[1387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdf72d8d0 a2=0 a3=1 items=0 ppid=1293 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:07:17.772000 audit[1388]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:17.772000 audit[1388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd9a07880 a2=0 a3=1 items=0 ppid=1293 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:17.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:07:17.772655 env[1293]: time="2024-02-09T10:07:17.772621446Z" level=info msg="Loading containers: done." Feb 9 10:07:17.789820 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2874686936-merged.mount: Deactivated successfully. Feb 9 10:07:17.793371 env[1293]: time="2024-02-09T10:07:17.793331350Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 10:07:17.793560 env[1293]: time="2024-02-09T10:07:17.793533589Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 10:07:17.793640 env[1293]: time="2024-02-09T10:07:17.793626605Z" level=info msg="Daemon has completed initialization" Feb 9 10:07:17.808381 systemd[1]: Started docker.service. Feb 9 10:07:17.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:17.813253 env[1293]: time="2024-02-09T10:07:17.813196460Z" level=info msg="API listen on /run/docker.sock" Feb 9 10:07:17.828553 systemd[1]: Reloading. Feb 9 10:07:17.868888 /usr/lib/systemd/system-generators/torcx-generator[1440]: time="2024-02-09T10:07:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:07:17.868932 /usr/lib/systemd/system-generators/torcx-generator[1440]: time="2024-02-09T10:07:17Z" level=info msg="torcx already run" Feb 9 10:07:17.922262 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:07:17.922280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:07:17.938450 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit: BPF prog-id=34 op=LOAD Feb 9 10:07:17.980000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit: BPF prog-id=35 op=LOAD Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.981000 audit: BPF prog-id=36 op=LOAD Feb 9 10:07:17.981000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:07:17.981000 audit: BPF prog-id=20 op=UNLOAD Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.982000 audit: BPF prog-id=37 op=LOAD Feb 9 10:07:17.983000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit: BPF prog-id=38 op=LOAD Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit: BPF prog-id=39 op=LOAD Feb 9 10:07:17.983000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:07:17.983000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit: BPF prog-id=40 op=LOAD Feb 9 10:07:17.983000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit: BPF prog-id=41 op=LOAD Feb 9 10:07:17.983000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit: BPF prog-id=42 op=LOAD Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.983000 audit: BPF prog-id=43 op=LOAD Feb 9 10:07:17.983000 audit: BPF prog-id=30 op=UNLOAD Feb 9 10:07:17.983000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit: BPF prog-id=44 op=LOAD Feb 9 10:07:17.984000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.984000 audit: BPF prog-id=45 op=LOAD Feb 9 10:07:17.984000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit: BPF prog-id=46 op=LOAD Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.986000 audit: BPF prog-id=47 op=LOAD Feb 9 10:07:17.986000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:07:17.986000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:17.987000 audit: BPF prog-id=48 op=LOAD Feb 9 10:07:17.987000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:07:17.993895 systemd[1]: Started kubelet.service. Feb 9 10:07:17.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:18.105277 kubelet[1475]: E0209 10:07:18.105211 1475 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 10:07:18.107334 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:07:18.107455 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:07:18.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:07:18.357852 env[1146]: time="2024-02-09T10:07:18.357807511Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 10:07:19.026260 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1131753243.mount: Deactivated successfully. Feb 9 10:07:21.487839 env[1146]: time="2024-02-09T10:07:21.487785150Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:21.489386 env[1146]: time="2024-02-09T10:07:21.489350663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:21.491204 env[1146]: time="2024-02-09T10:07:21.491172970Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:21.493387 env[1146]: time="2024-02-09T10:07:21.493353799Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:21.494122 env[1146]: time="2024-02-09T10:07:21.494083627Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 9 10:07:21.505140 env[1146]: time="2024-02-09T10:07:21.505114793Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 10:07:23.731504 env[1146]: time="2024-02-09T10:07:23.731435334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:23.733149 env[1146]: time="2024-02-09T10:07:23.733114092Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:23.734663 env[1146]: time="2024-02-09T10:07:23.734625834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:23.736097 env[1146]: time="2024-02-09T10:07:23.736069017Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:23.737556 env[1146]: time="2024-02-09T10:07:23.737513148Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 9 10:07:23.746334 env[1146]: time="2024-02-09T10:07:23.746293213Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 10:07:24.915021 env[1146]: time="2024-02-09T10:07:24.914935767Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:24.916923 env[1146]: time="2024-02-09T10:07:24.916885213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:24.919145 env[1146]: time="2024-02-09T10:07:24.919113490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:24.920589 env[1146]: time="2024-02-09T10:07:24.920558792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:24.921407 env[1146]: time="2024-02-09T10:07:24.921376220Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 9 10:07:24.930041 env[1146]: time="2024-02-09T10:07:24.930011366Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 10:07:26.074388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2610433657.mount: Deactivated successfully. Feb 9 10:07:27.091076 env[1146]: time="2024-02-09T10:07:27.091021254Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.092397 env[1146]: time="2024-02-09T10:07:27.092363441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.093957 env[1146]: time="2024-02-09T10:07:27.093912242Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.095624 env[1146]: time="2024-02-09T10:07:27.095592935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.099319 env[1146]: time="2024-02-09T10:07:27.099288497Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 9 10:07:27.107541 env[1146]: time="2024-02-09T10:07:27.107514092Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 10:07:27.558174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2747425216.mount: Deactivated successfully. Feb 9 10:07:27.561503 env[1146]: time="2024-02-09T10:07:27.561453524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.562722 env[1146]: time="2024-02-09T10:07:27.562687800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.564004 env[1146]: time="2024-02-09T10:07:27.563980241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.565129 env[1146]: time="2024-02-09T10:07:27.565099339Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:27.565835 env[1146]: time="2024-02-09T10:07:27.565802592Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 10:07:27.575145 env[1146]: time="2024-02-09T10:07:27.575110323Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 10:07:28.184374 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 10:07:28.184541 systemd[1]: Stopped kubelet.service. Feb 9 10:07:28.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:28.185977 systemd[1]: Started kubelet.service. Feb 9 10:07:28.186863 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 10:07:28.186926 kernel: audit: type=1130 audit(1707473248.184:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:28.186950 kernel: audit: type=1131 audit(1707473248.184:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:28.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:28.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:28.192788 kernel: audit: type=1130 audit(1707473248.185:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:28.231428 kubelet[1531]: E0209 10:07:28.231371 1531 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 10:07:28.237628 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:07:28.237753 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:07:28.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:07:28.245265 kernel: audit: type=1131 audit(1707473248.236:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:07:28.467289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4251133322.mount: Deactivated successfully. Feb 9 10:07:30.264829 env[1146]: time="2024-02-09T10:07:30.264783990Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:30.266008 env[1146]: time="2024-02-09T10:07:30.265977695Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:30.268204 env[1146]: time="2024-02-09T10:07:30.268178600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:30.269837 env[1146]: time="2024-02-09T10:07:30.269814174Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:30.270544 env[1146]: time="2024-02-09T10:07:30.270517852Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 9 10:07:30.279403 env[1146]: time="2024-02-09T10:07:30.279378903Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 10:07:30.863931 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount471957326.mount: Deactivated successfully. Feb 9 10:07:31.523758 env[1146]: time="2024-02-09T10:07:31.523717176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:31.525543 env[1146]: time="2024-02-09T10:07:31.525504434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:31.527376 env[1146]: time="2024-02-09T10:07:31.527343465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:31.528755 env[1146]: time="2024-02-09T10:07:31.528731709Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:31.529953 env[1146]: time="2024-02-09T10:07:31.529926719Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 10:07:35.062477 systemd[1]: Stopped kubelet.service. Feb 9 10:07:35.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:35.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:35.066586 kernel: audit: type=1130 audit(1707473255.061:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:35.066648 kernel: audit: type=1131 audit(1707473255.061:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:35.075720 systemd[1]: Reloading. Feb 9 10:07:35.126100 /usr/lib/systemd/system-generators/torcx-generator[1643]: time="2024-02-09T10:07:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:07:35.126129 /usr/lib/systemd/system-generators/torcx-generator[1643]: time="2024-02-09T10:07:35Z" level=info msg="torcx already run" Feb 9 10:07:35.183672 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:07:35.183879 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:07:35.200760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.248935 kernel: audit: type=1400 audit(1707473255.244:388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.249000 kernel: audit: type=1400 audit(1707473255.244:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.249027 kernel: audit: type=1400 audit(1707473255.244:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.250597 kernel: audit: type=1400 audit(1707473255.244:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252266 kernel: audit: type=1400 audit(1707473255.244:392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.253934 kernel: audit: type=1400 audit(1707473255.244:393): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.255640 kernel: audit: type=1400 audit(1707473255.244:394): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.257349 kernel: audit: type=1400 audit(1707473255.244:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit: BPF prog-id=49 op=LOAD Feb 9 10:07:35.246000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit: BPF prog-id=50 op=LOAD Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.249000 audit: BPF prog-id=51 op=LOAD Feb 9 10:07:35.249000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:07:35.249000 audit: BPF prog-id=36 op=UNLOAD Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit: BPF prog-id=52 op=LOAD Feb 9 10:07:35.252000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit: BPF prog-id=53 op=LOAD Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.256000 audit: BPF prog-id=54 op=LOAD Feb 9 10:07:35.256000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:07:35.256000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:07:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.259000 audit: BPF prog-id=55 op=LOAD Feb 9 10:07:35.259000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit: BPF prog-id=56 op=LOAD Feb 9 10:07:35.261000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit: BPF prog-id=57 op=LOAD Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit: BPF prog-id=58 op=LOAD Feb 9 10:07:35.262000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:07:35.262000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.262000 audit: BPF prog-id=59 op=LOAD Feb 9 10:07:35.262000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.263000 audit: BPF prog-id=60 op=LOAD Feb 9 10:07:35.263000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit: BPF prog-id=61 op=LOAD Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.264000 audit: BPF prog-id=62 op=LOAD Feb 9 10:07:35.264000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:07:35.264000 audit: BPF prog-id=47 op=UNLOAD Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:35.265000 audit: BPF prog-id=63 op=LOAD Feb 9 10:07:35.265000 audit: BPF prog-id=48 op=UNLOAD Feb 9 10:07:35.278174 systemd[1]: Started kubelet.service. Feb 9 10:07:35.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:35.318475 kubelet[1682]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:07:35.318475 kubelet[1682]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 10:07:35.318475 kubelet[1682]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:07:35.318475 kubelet[1682]: I0209 10:07:35.318453 1682 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:07:36.919591 kubelet[1682]: I0209 10:07:36.919545 1682 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 10:07:36.919591 kubelet[1682]: I0209 10:07:36.919580 1682 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:07:36.919904 kubelet[1682]: I0209 10:07:36.919789 1682 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 10:07:36.924776 kubelet[1682]: I0209 10:07:36.924749 1682 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:07:36.924967 kubelet[1682]: E0209 10:07:36.924820 1682 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.126:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.926228 kubelet[1682]: W0209 10:07:36.926207 1682 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:07:36.926905 kubelet[1682]: I0209 10:07:36.926890 1682 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:07:36.927113 kubelet[1682]: I0209 10:07:36.927092 1682 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:07:36.927173 kubelet[1682]: I0209 10:07:36.927158 1682 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:07:36.927256 kubelet[1682]: I0209 10:07:36.927180 1682 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:07:36.927256 kubelet[1682]: I0209 10:07:36.927192 1682 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 10:07:36.927308 kubelet[1682]: I0209 10:07:36.927302 1682 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:07:36.930199 kubelet[1682]: I0209 10:07:36.930179 1682 kubelet.go:405] "Attempting to sync node with API server" Feb 9 10:07:36.930199 kubelet[1682]: I0209 10:07:36.930203 1682 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:07:36.930307 kubelet[1682]: I0209 10:07:36.930224 1682 kubelet.go:309] "Adding apiserver pod source" Feb 9 10:07:36.930307 kubelet[1682]: I0209 10:07:36.930238 1682 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:07:36.930944 kubelet[1682]: I0209 10:07:36.930913 1682 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:07:36.930998 kubelet[1682]: W0209 10:07:36.930925 1682 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.126:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.930998 kubelet[1682]: E0209 10:07:36.930971 1682 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.126:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.931053 kubelet[1682]: W0209 10:07:36.931016 1682 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.126:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.931053 kubelet[1682]: E0209 10:07:36.931041 1682 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.126:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.931327 kubelet[1682]: W0209 10:07:36.931307 1682 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:07:36.931959 kubelet[1682]: I0209 10:07:36.931935 1682 server.go:1168] "Started kubelet" Feb 9 10:07:36.932204 kubelet[1682]: I0209 10:07:36.932177 1682 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 10:07:36.932521 kubelet[1682]: E0209 10:07:36.932428 1682 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b229e16ee7ed88", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 7, 36, 931913096, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 7, 36, 931913096, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.126:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.126:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:07:36.932857 kubelet[1682]: I0209 10:07:36.932837 1682 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:07:36.934976 kubelet[1682]: I0209 10:07:36.934928 1682 server.go:461] "Adding debug handlers to kubelet server" Feb 9 10:07:36.935379 kubelet[1682]: E0209 10:07:36.935360 1682 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:07:36.935462 kubelet[1682]: E0209 10:07:36.935452 1682 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:07:36.934000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:36.934000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:07:36.934000 audit[1682]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ec2720 a1=4000c08888 a2=4000ec26f0 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.934000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:07:36.934000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:36.934000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:07:36.934000 audit[1682]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000fa4440 a1=4000058ca8 a2=4000ce75c0 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.934000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:07:36.936288 kubelet[1682]: I0209 10:07:36.935931 1682 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:07:36.936288 kubelet[1682]: I0209 10:07:36.936030 1682 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:07:36.936288 kubelet[1682]: I0209 10:07:36.936109 1682 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:07:36.937748 kubelet[1682]: I0209 10:07:36.937716 1682 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 10:07:36.938041 kubelet[1682]: I0209 10:07:36.938014 1682 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 10:07:36.938290 kubelet[1682]: E0209 10:07:36.938235 1682 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.126:6443: connect: connection refused" interval="200ms" Feb 9 10:07:36.938340 kubelet[1682]: W0209 10:07:36.938303 1682 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.938374 kubelet[1682]: E0209 10:07:36.938344 1682 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.938000 audit[1694]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.938000 audit[1694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffd1ed360 a2=0 a3=1 items=0 ppid=1682 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:07:36.939000 audit[1695]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.939000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9b79190 a2=0 a3=1 items=0 ppid=1682 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:07:36.941000 audit[1697]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.941000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffebe40f10 a2=0 a3=1 items=0 ppid=1682 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:07:36.943000 audit[1699]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.943000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffedfdadc0 a2=0 a3=1 items=0 ppid=1682 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:07:36.949000 audit[1702]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.949000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe9ae7e70 a2=0 a3=1 items=0 ppid=1682 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:07:36.951106 kubelet[1682]: I0209 10:07:36.951080 1682 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:07:36.950000 audit[1704]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:36.950000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe1210f50 a2=0 a3=1 items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:07:36.952151 kubelet[1682]: I0209 10:07:36.952131 1682 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:07:36.952202 kubelet[1682]: I0209 10:07:36.952159 1682 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 10:07:36.952202 kubelet[1682]: I0209 10:07:36.952176 1682 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 10:07:36.952269 kubelet[1682]: E0209 10:07:36.952226 1682 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:07:36.951000 audit[1705]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.951000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffeb0c200 a2=0 a3=1 items=0 ppid=1682 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:07:36.952000 audit[1707]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.952000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce0e9ec0 a2=0 a3=1 items=0 ppid=1682 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:07:36.953000 audit[1709]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:36.953000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4c7bd70 a2=0 a3=1 items=0 ppid=1682 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:07:36.955895 kubelet[1682]: W0209 10:07:36.955863 1682 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.955970 kubelet[1682]: E0209 10:07:36.955902 1682 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:36.954000 audit[1712]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:36.954000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeaf75e70 a2=0 a3=1 items=0 ppid=1682 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:07:36.956738 kubelet[1682]: I0209 10:07:36.956716 1682 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:07:36.956738 kubelet[1682]: I0209 10:07:36.956735 1682 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:07:36.956811 kubelet[1682]: I0209 10:07:36.956752 1682 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:07:36.956000 audit[1714]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:36.956000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff14ed2f0 a2=0 a3=1 items=0 ppid=1682 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:07:36.958686 kubelet[1682]: I0209 10:07:36.958664 1682 policy_none.go:49] "None policy: Start" Feb 9 10:07:36.959142 kubelet[1682]: I0209 10:07:36.959126 1682 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:07:36.959197 kubelet[1682]: I0209 10:07:36.959153 1682 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:07:36.958000 audit[1715]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:36.958000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc311e6d0 a2=0 a3=1 items=0 ppid=1682 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:07:36.963919 systemd[1]: Created slice kubepods.slice. Feb 9 10:07:36.967479 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:07:36.969677 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:07:36.983908 kubelet[1682]: I0209 10:07:36.983876 1682 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:07:36.982000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:36.982000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:07:36.982000 audit[1682]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c10900 a1=4000c9d500 a2=4000c108d0 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:36.982000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:07:36.984112 kubelet[1682]: I0209 10:07:36.983945 1682 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:07:36.984142 kubelet[1682]: I0209 10:07:36.984118 1682 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:07:36.985180 kubelet[1682]: E0209 10:07:36.985151 1682 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 9 10:07:37.039925 kubelet[1682]: I0209 10:07:37.039900 1682 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:07:37.040337 kubelet[1682]: E0209 10:07:37.040321 1682 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.126:6443/api/v1/nodes\": dial tcp 10.0.0.126:6443: connect: connection refused" node="localhost" Feb 9 10:07:37.052440 kubelet[1682]: I0209 10:07:37.052410 1682 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:37.053454 kubelet[1682]: I0209 10:07:37.053429 1682 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:37.054485 kubelet[1682]: I0209 10:07:37.054450 1682 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:37.058727 systemd[1]: Created slice kubepods-burstable-pod059119f1162e6a5dd910a0f7b370c964.slice. Feb 9 10:07:37.093071 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 9 10:07:37.095667 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 9 10:07:37.139669 kubelet[1682]: E0209 10:07:37.139628 1682 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.126:6443: connect: connection refused" interval="400ms" Feb 9 10:07:37.239073 kubelet[1682]: I0209 10:07:37.239045 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:37.239195 kubelet[1682]: I0209 10:07:37.239095 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:37.239195 kubelet[1682]: I0209 10:07:37.239123 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:37.239195 kubelet[1682]: I0209 10:07:37.239151 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/059119f1162e6a5dd910a0f7b370c964-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"059119f1162e6a5dd910a0f7b370c964\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:37.239195 kubelet[1682]: I0209 10:07:37.239174 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/059119f1162e6a5dd910a0f7b370c964-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"059119f1162e6a5dd910a0f7b370c964\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:37.239195 kubelet[1682]: I0209 10:07:37.239192 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:37.239359 kubelet[1682]: I0209 10:07:37.239209 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 9 10:07:37.239359 kubelet[1682]: I0209 10:07:37.239226 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/059119f1162e6a5dd910a0f7b370c964-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"059119f1162e6a5dd910a0f7b370c964\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:37.239359 kubelet[1682]: I0209 10:07:37.239257 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:37.241416 kubelet[1682]: I0209 10:07:37.241397 1682 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:07:37.241725 kubelet[1682]: E0209 10:07:37.241708 1682 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.126:6443/api/v1/nodes\": dial tcp 10.0.0.126:6443: connect: connection refused" node="localhost" Feb 9 10:07:37.391314 kubelet[1682]: E0209 10:07:37.391287 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:37.391945 env[1146]: time="2024-02-09T10:07:37.391901711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:059119f1162e6a5dd910a0f7b370c964,Namespace:kube-system,Attempt:0,}" Feb 9 10:07:37.395884 kubelet[1682]: E0209 10:07:37.395862 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:37.396283 env[1146]: time="2024-02-09T10:07:37.396235659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 9 10:07:37.397748 kubelet[1682]: E0209 10:07:37.397731 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:37.398050 env[1146]: time="2024-02-09T10:07:37.398021480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 9 10:07:37.540580 kubelet[1682]: E0209 10:07:37.540451 1682 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.126:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.126:6443: connect: connection refused" interval="800ms" Feb 9 10:07:37.642838 kubelet[1682]: I0209 10:07:37.642809 1682 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:07:37.643167 kubelet[1682]: E0209 10:07:37.643134 1682 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.126:6443/api/v1/nodes\": dial tcp 10.0.0.126:6443: connect: connection refused" node="localhost" Feb 9 10:07:37.877806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount394169914.mount: Deactivated successfully. Feb 9 10:07:37.881492 env[1146]: time="2024-02-09T10:07:37.881447825Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.883492 env[1146]: time="2024-02-09T10:07:37.883459124Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.884844 env[1146]: time="2024-02-09T10:07:37.884815506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.885812 env[1146]: time="2024-02-09T10:07:37.885787242Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.886441 env[1146]: time="2024-02-09T10:07:37.886422917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.887673 env[1146]: time="2024-02-09T10:07:37.887633145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.889688 env[1146]: time="2024-02-09T10:07:37.889667240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.891744 env[1146]: time="2024-02-09T10:07:37.891720895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.893050 env[1146]: time="2024-02-09T10:07:37.893026138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.894533 env[1146]: time="2024-02-09T10:07:37.894502126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.895213 env[1146]: time="2024-02-09T10:07:37.895190138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.895923 env[1146]: time="2024-02-09T10:07:37.895901025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:37.931565 env[1146]: time="2024-02-09T10:07:37.930930665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:07:37.931565 env[1146]: time="2024-02-09T10:07:37.930968751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:07:37.931565 env[1146]: time="2024-02-09T10:07:37.930983163Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:07:37.931565 env[1146]: time="2024-02-09T10:07:37.931139377Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/250b7036f13332a216985233a8550947bdfb8825475b0be2efa2f1f981355cbb pid=1740 runtime=io.containerd.runc.v2 Feb 9 10:07:37.932330 env[1146]: time="2024-02-09T10:07:37.932279942Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:07:37.932386 env[1146]: time="2024-02-09T10:07:37.932315911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:07:37.932386 env[1146]: time="2024-02-09T10:07:37.932354196Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:07:37.932565 env[1146]: time="2024-02-09T10:07:37.932489212Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/139444b6d20dae4b5f2095b0e74078066140d03ea7d1b383b2ff15d1718d7190 pid=1742 runtime=io.containerd.runc.v2 Feb 9 10:07:37.933463 env[1146]: time="2024-02-09T10:07:37.932740719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:07:37.933463 env[1146]: time="2024-02-09T10:07:37.932779124Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:07:37.933463 env[1146]: time="2024-02-09T10:07:37.932796130Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:07:37.933463 env[1146]: time="2024-02-09T10:07:37.933078377Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aed940e94345782c2f63e2347dd2ac261a52784579a103a7a67e056816497c4d pid=1741 runtime=io.containerd.runc.v2 Feb 9 10:07:37.944386 systemd[1]: Started cri-containerd-139444b6d20dae4b5f2095b0e74078066140d03ea7d1b383b2ff15d1718d7190.scope. Feb 9 10:07:37.945364 systemd[1]: Started cri-containerd-250b7036f13332a216985233a8550947bdfb8825475b0be2efa2f1f981355cbb.scope. Feb 9 10:07:37.963343 systemd[1]: Started cri-containerd-aed940e94345782c2f63e2347dd2ac261a52784579a103a7a67e056816497c4d.scope. Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit: BPF prog-id=64 op=LOAD Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1741 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643934306539343334353738326332663633653233343764643261 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1741 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643934306539343334353738326332663633653233343764643261 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit: BPF prog-id=65 op=LOAD Feb 9 10:07:37.980000 audit[1769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1741 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643934306539343334353738326332663633653233343764643261 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit: BPF prog-id=66 op=LOAD Feb 9 10:07:37.980000 audit[1769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1741 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643934306539343334353738326332663633653233343764643261 Feb 9 10:07:37.980000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:07:37.980000 audit: BPF prog-id=65 op=UNLOAD Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.980000 audit: BPF prog-id=67 op=LOAD Feb 9 10:07:37.980000 audit[1769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1741 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643934306539343334353738326332663633653233343764643261 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.982000 audit: BPF prog-id=68 op=LOAD Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1742 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393434346236643230646165346235663230393562306537343037 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1742 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393434346236643230646165346235663230393562306537343037 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.984000 audit: BPF prog-id=69 op=LOAD Feb 9 10:07:37.984000 audit[1768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1742 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393434346236643230646165346235663230393562306537343037 Feb 9 10:07:37.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit: BPF prog-id=70 op=LOAD Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit: BPF prog-id=71 op=LOAD Feb 9 10:07:37.985000 audit[1768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1742 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393434346236643230646165346235663230393562306537343037 Feb 9 10:07:37.985000 audit: BPF prog-id=71 op=UNLOAD Feb 9 10:07:37.985000 audit: BPF prog-id=69 op=UNLOAD Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1740 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306237303336663133333332613231363938353233336138353530 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1740 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: BPF prog-id=72 op=LOAD Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306237303336663133333332613231363938353233336138353530 Feb 9 10:07:37.985000 audit[1768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1742 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133393434346236643230646165346235663230393562306537343037 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit: BPF prog-id=73 op=LOAD Feb 9 10:07:37.985000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1740 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306237303336663133333332613231363938353233336138353530 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit: BPF prog-id=74 op=LOAD Feb 9 10:07:37.985000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1740 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306237303336663133333332613231363938353233336138353530 Feb 9 10:07:37.985000 audit: BPF prog-id=74 op=UNLOAD Feb 9 10:07:37.985000 audit: BPF prog-id=73 op=UNLOAD Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:37.985000 audit: BPF prog-id=75 op=LOAD Feb 9 10:07:37.985000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1740 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306237303336663133333332613231363938353233336138353530 Feb 9 10:07:38.010865 env[1146]: time="2024-02-09T10:07:38.010821352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:059119f1162e6a5dd910a0f7b370c964,Namespace:kube-system,Attempt:0,} returns sandbox id \"250b7036f13332a216985233a8550947bdfb8825475b0be2efa2f1f981355cbb\"" Feb 9 10:07:38.011921 kubelet[1682]: E0209 10:07:38.011898 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:38.014086 env[1146]: time="2024-02-09T10:07:38.014051376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"aed940e94345782c2f63e2347dd2ac261a52784579a103a7a67e056816497c4d\"" Feb 9 10:07:38.014579 kubelet[1682]: E0209 10:07:38.014557 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:38.014833 env[1146]: time="2024-02-09T10:07:38.014565854Z" level=info msg="CreateContainer within sandbox \"250b7036f13332a216985233a8550947bdfb8825475b0be2efa2f1f981355cbb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 10:07:38.017523 env[1146]: time="2024-02-09T10:07:38.017470954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"139444b6d20dae4b5f2095b0e74078066140d03ea7d1b383b2ff15d1718d7190\"" Feb 9 10:07:38.018512 env[1146]: time="2024-02-09T10:07:38.018471759Z" level=info msg="CreateContainer within sandbox \"aed940e94345782c2f63e2347dd2ac261a52784579a103a7a67e056816497c4d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 10:07:38.018792 kubelet[1682]: E0209 10:07:38.018771 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:38.020713 env[1146]: time="2024-02-09T10:07:38.020678975Z" level=info msg="CreateContainer within sandbox \"139444b6d20dae4b5f2095b0e74078066140d03ea7d1b383b2ff15d1718d7190\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 10:07:38.032686 env[1146]: time="2024-02-09T10:07:38.032623062Z" level=info msg="CreateContainer within sandbox \"250b7036f13332a216985233a8550947bdfb8825475b0be2efa2f1f981355cbb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9be5ce3c2f09c50034a00809d5cd6a341180e9184ddcf3747c9deca1004035ac\"" Feb 9 10:07:38.033298 env[1146]: time="2024-02-09T10:07:38.033256216Z" level=info msg="StartContainer for \"9be5ce3c2f09c50034a00809d5cd6a341180e9184ddcf3747c9deca1004035ac\"" Feb 9 10:07:38.036967 env[1146]: time="2024-02-09T10:07:38.036931157Z" level=info msg="CreateContainer within sandbox \"aed940e94345782c2f63e2347dd2ac261a52784579a103a7a67e056816497c4d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"56b5025bc3c6d007080178add2618984dee8eff09367a0890718e8daedadfe3f\"" Feb 9 10:07:38.037535 env[1146]: time="2024-02-09T10:07:38.037479817Z" level=info msg="StartContainer for \"56b5025bc3c6d007080178add2618984dee8eff09367a0890718e8daedadfe3f\"" Feb 9 10:07:38.039389 env[1146]: time="2024-02-09T10:07:38.039357318Z" level=info msg="CreateContainer within sandbox \"139444b6d20dae4b5f2095b0e74078066140d03ea7d1b383b2ff15d1718d7190\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a4cb03b51c8e516653b452bcd17094c1ac8ee582bbdb0493fb13f34c40b4dd6a\"" Feb 9 10:07:38.039847 env[1146]: time="2024-02-09T10:07:38.039822441Z" level=info msg="StartContainer for \"a4cb03b51c8e516653b452bcd17094c1ac8ee582bbdb0493fb13f34c40b4dd6a\"" Feb 9 10:07:38.053958 systemd[1]: Started cri-containerd-9be5ce3c2f09c50034a00809d5cd6a341180e9184ddcf3747c9deca1004035ac.scope. Feb 9 10:07:38.056198 systemd[1]: Started cri-containerd-a4cb03b51c8e516653b452bcd17094c1ac8ee582bbdb0493fb13f34c40b4dd6a.scope. Feb 9 10:07:38.079549 systemd[1]: Started cri-containerd-56b5025bc3c6d007080178add2618984dee8eff09367a0890718e8daedadfe3f.scope. Feb 9 10:07:38.090564 kubelet[1682]: W0209 10:07:38.089508 1682 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:38.090564 kubelet[1682]: E0209 10:07:38.089570 1682 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.126:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit: BPF prog-id=76 op=LOAD Feb 9 10:07:38.103000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.103000 audit[1872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1741 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623530323562633363366430303730383031373861646432363138 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1741 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623530323562633363366430303730383031373861646432363138 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit: BPF prog-id=77 op=LOAD Feb 9 10:07:38.104000 audit[1872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1741 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623530323562633363366430303730383031373861646432363138 Feb 9 10:07:38.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit: BPF prog-id=78 op=LOAD Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.104000 audit: BPF prog-id=79 op=LOAD Feb 9 10:07:38.104000 audit[1872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1741 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623530323562633363366430303730383031373861646432363138 Feb 9 10:07:38.105000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:07:38.105000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1742 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636230336235316338653531363635336234353262636431373039 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1742 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636230336235316338653531363635336234353262636431373039 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit: BPF prog-id=80 op=LOAD Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1741 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623530323562633363366430303730383031373861646432363138 Feb 9 10:07:38.105000 audit: BPF prog-id=81 op=LOAD Feb 9 10:07:38.105000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1742 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636230336235316338653531363635336234353262636431373039 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.105000 audit: BPF prog-id=82 op=LOAD Feb 9 10:07:38.105000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1742 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134636230336235316338653531363635336234353262636431373039 Feb 9 10:07:38.105000 audit: BPF prog-id=82 op=UNLOAD Feb 9 10:07:38.105000 audit: BPF prog-id=81 op=UNLOAD Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit: BPF prog-id=84 op=LOAD Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1740 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653563653363326630396335303033346130303830396435636436 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1740 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653563653363326630396335303033346130303830396435636436 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit: BPF prog-id=85 op=LOAD Feb 9 10:07:38.110000 audit[1849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1740 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653563653363326630396335303033346130303830396435636436 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit: BPF prog-id=86 op=LOAD Feb 9 10:07:38.110000 audit[1849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1740 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653563653363326630396335303033346130303830396435636436 Feb 9 10:07:38.110000 audit: BPF prog-id=86 op=UNLOAD Feb 9 10:07:38.110000 audit: BPF prog-id=85 op=UNLOAD Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:38.110000 audit: BPF prog-id=87 op=LOAD Feb 9 10:07:38.110000 audit[1849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1740 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653563653363326630396335303033346130303830396435636436 Feb 9 10:07:38.136989 env[1146]: time="2024-02-09T10:07:38.136341277Z" level=info msg="StartContainer for \"a4cb03b51c8e516653b452bcd17094c1ac8ee582bbdb0493fb13f34c40b4dd6a\" returns successfully" Feb 9 10:07:38.142337 env[1146]: time="2024-02-09T10:07:38.142232699Z" level=info msg="StartContainer for \"56b5025bc3c6d007080178add2618984dee8eff09367a0890718e8daedadfe3f\" returns successfully" Feb 9 10:07:38.146595 env[1146]: time="2024-02-09T10:07:38.143376738Z" level=info msg="StartContainer for \"9be5ce3c2f09c50034a00809d5cd6a341180e9184ddcf3747c9deca1004035ac\" returns successfully" Feb 9 10:07:38.307548 kubelet[1682]: W0209 10:07:38.307489 1682 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:38.307664 kubelet[1682]: E0209 10:07:38.307560 1682 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.126:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.126:6443: connect: connection refused Feb 9 10:07:38.445194 kubelet[1682]: I0209 10:07:38.444632 1682 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:07:38.965483 kubelet[1682]: E0209 10:07:38.965420 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:38.966422 kubelet[1682]: E0209 10:07:38.966044 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:38.967159 kubelet[1682]: E0209 10:07:38.967114 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:39.732000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.732000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=40036c6820 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:07:39.732000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:07:39.732000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.732000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4005d5dc80 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:07:39.732000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:07:39.732000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.732000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4005d5dce0 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:07:39.732000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:07:39.745000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.745000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=40050d7920 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:07:39.745000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:07:39.760000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.760000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40008e98e0 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:07:39.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:07:39.760000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.760000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=4000c9fcb0 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:07:39.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:07:39.816336 kubelet[1682]: E0209 10:07:39.816300 1682 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 9 10:07:39.873425 kubelet[1682]: I0209 10:07:39.873390 1682 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 10:07:39.876000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.876000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40001faea0 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:39.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:39.876000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:39.876000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400046d720 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:39.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:39.932210 kubelet[1682]: I0209 10:07:39.932173 1682 apiserver.go:52] "Watching apiserver" Feb 9 10:07:39.938957 kubelet[1682]: I0209 10:07:39.938926 1682 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 10:07:39.952918 kubelet[1682]: I0209 10:07:39.952887 1682 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:07:39.972647 kubelet[1682]: E0209 10:07:39.972616 1682 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:39.973271 kubelet[1682]: E0209 10:07:39.973235 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:39.973512 kubelet[1682]: E0209 10:07:39.973450 1682 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" Feb 9 10:07:39.973813 kubelet[1682]: E0209 10:07:39.973801 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:42.357686 systemd[1]: Reloading. Feb 9 10:07:42.404303 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2024-02-09T10:07:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:07:42.405125 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2024-02-09T10:07:42Z" level=info msg="torcx already run" Feb 9 10:07:42.455691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:07:42.455712 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:07:42.470368 kubelet[1682]: E0209 10:07:42.470341 1682 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:42.476384 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542298 kernel: kauditd_printk_skb: 607 callbacks suppressed Feb 9 10:07:42.542356 kernel: audit: type=1400 audit(1707473262.540:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.545730 kernel: audit: type=1400 audit(1707473262.540:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547570 kernel: audit: type=1400 audit(1707473262.540:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547612 kernel: audit: type=1400 audit(1707473262.540:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.549274 kernel: audit: type=1400 audit(1707473262.540:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.552717 kernel: audit: type=1400 audit(1707473262.540:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.552838 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:07:42.552863 kernel: audit: type=1400 audit(1707473262.540:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.552882 kernel: audit: type=1400 audit(1707473262.540:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.554816 kernel: audit: audit_lost=16 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:07:42.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit: BPF prog-id=88 op=LOAD Feb 9 10:07:42.541000 audit: BPF prog-id=68 op=UNLOAD Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit: BPF prog-id=89 op=LOAD Feb 9 10:07:42.542000 audit: BPF prog-id=49 op=UNLOAD Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit: BPF prog-id=90 op=LOAD Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.546000 audit: BPF prog-id=91 op=LOAD Feb 9 10:07:42.546000 audit: BPF prog-id=50 op=UNLOAD Feb 9 10:07:42.546000 audit: BPF prog-id=51 op=UNLOAD Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit: BPF prog-id=92 op=LOAD Feb 9 10:07:42.548000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.549000 audit: BPF prog-id=93 op=LOAD Feb 9 10:07:42.549000 audit: BPF prog-id=78 op=UNLOAD Feb 9 10:07:42.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.555000 audit: BPF prog-id=94 op=LOAD Feb 9 10:07:42.555000 audit: BPF prog-id=52 op=UNLOAD Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit: BPF prog-id=95 op=LOAD Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit: BPF prog-id=96 op=LOAD Feb 9 10:07:42.556000 audit: BPF prog-id=53 op=UNLOAD Feb 9 10:07:42.556000 audit: BPF prog-id=54 op=UNLOAD Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.556000 audit: BPF prog-id=97 op=LOAD Feb 9 10:07:42.556000 audit: BPF prog-id=55 op=UNLOAD Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit: BPF prog-id=98 op=LOAD Feb 9 10:07:42.557000 audit: BPF prog-id=56 op=UNLOAD Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit: BPF prog-id=99 op=LOAD Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.557000 audit: BPF prog-id=100 op=LOAD Feb 9 10:07:42.557000 audit: BPF prog-id=57 op=UNLOAD Feb 9 10:07:42.557000 audit: BPF prog-id=58 op=UNLOAD Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit: BPF prog-id=101 op=LOAD Feb 9 10:07:42.558000 audit: BPF prog-id=59 op=UNLOAD Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.558000 audit: BPF prog-id=102 op=LOAD Feb 9 10:07:42.558000 audit: BPF prog-id=60 op=UNLOAD Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit: BPF prog-id=103 op=LOAD Feb 9 10:07:42.559000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.559000 audit: BPF prog-id=104 op=LOAD Feb 9 10:07:42.559000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit: BPF prog-id=105 op=LOAD Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit: BPF prog-id=106 op=LOAD Feb 9 10:07:42.561000 audit: BPF prog-id=61 op=UNLOAD Feb 9 10:07:42.561000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.561000 audit: BPF prog-id=107 op=LOAD Feb 9 10:07:42.561000 audit: BPF prog-id=70 op=UNLOAD Feb 9 10:07:42.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.563000 audit: BPF prog-id=108 op=LOAD Feb 9 10:07:42.563000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:07:42.575014 systemd[1]: Stopping kubelet.service... Feb 9 10:07:42.596488 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 10:07:42.596675 systemd[1]: Stopped kubelet.service. Feb 9 10:07:42.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:42.596725 systemd[1]: kubelet.service: Consumed 1.937s CPU time. Feb 9 10:07:42.598820 systemd[1]: Started kubelet.service. Feb 9 10:07:42.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:42.677301 kubelet[2015]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:07:42.677301 kubelet[2015]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 10:07:42.677301 kubelet[2015]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:07:42.677301 kubelet[2015]: I0209 10:07:42.674887 2015 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:07:42.678831 kubelet[2015]: I0209 10:07:42.678809 2015 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 10:07:42.678831 kubelet[2015]: I0209 10:07:42.678832 2015 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:07:42.679030 kubelet[2015]: I0209 10:07:42.679014 2015 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 10:07:42.680612 kubelet[2015]: I0209 10:07:42.680590 2015 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 10:07:42.681542 kubelet[2015]: I0209 10:07:42.681518 2015 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:07:42.682925 kubelet[2015]: W0209 10:07:42.682897 2015 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:07:42.683631 kubelet[2015]: I0209 10:07:42.683609 2015 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:07:42.683813 kubelet[2015]: I0209 10:07:42.683795 2015 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:07:42.683868 kubelet[2015]: I0209 10:07:42.683858 2015 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:07:42.683936 kubelet[2015]: I0209 10:07:42.683877 2015 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:07:42.683936 kubelet[2015]: I0209 10:07:42.683887 2015 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 10:07:42.683936 kubelet[2015]: I0209 10:07:42.683917 2015 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:07:42.686408 kubelet[2015]: I0209 10:07:42.686389 2015 kubelet.go:405] "Attempting to sync node with API server" Feb 9 10:07:42.686408 kubelet[2015]: I0209 10:07:42.686411 2015 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:07:42.686511 kubelet[2015]: I0209 10:07:42.686433 2015 kubelet.go:309] "Adding apiserver pod source" Feb 9 10:07:42.686511 kubelet[2015]: I0209 10:07:42.686447 2015 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:07:42.686985 kubelet[2015]: I0209 10:07:42.686966 2015 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:07:42.687423 kubelet[2015]: I0209 10:07:42.687404 2015 server.go:1168] "Started kubelet" Feb 9 10:07:42.689616 kubelet[2015]: I0209 10:07:42.689589 2015 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:07:42.690177 kubelet[2015]: I0209 10:07:42.690156 2015 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 10:07:42.689000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:07:42.689000 audit[2015]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40001bf980 a1=4000dd0678 a2=40001bf950 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:42.689000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:07:42.689000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:07:42.689000 audit[2015]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ee40c0 a1=4000dd0690 a2=40001bfa10 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:42.689000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:07:42.690662 kubelet[2015]: I0209 10:07:42.690379 2015 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:07:42.690662 kubelet[2015]: I0209 10:07:42.690425 2015 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:07:42.690662 kubelet[2015]: I0209 10:07:42.690452 2015 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:07:42.691537 kubelet[2015]: E0209 10:07:42.691514 2015 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:07:42.691592 kubelet[2015]: E0209 10:07:42.691541 2015 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:07:42.699655 kubelet[2015]: I0209 10:07:42.699161 2015 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 10:07:42.703272 kubelet[2015]: I0209 10:07:42.699304 2015 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 10:07:42.705130 kubelet[2015]: I0209 10:07:42.705089 2015 server.go:461] "Adding debug handlers to kubelet server" Feb 9 10:07:42.727832 kubelet[2015]: I0209 10:07:42.727688 2015 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:07:42.729358 kubelet[2015]: I0209 10:07:42.729334 2015 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:07:42.729358 kubelet[2015]: I0209 10:07:42.729363 2015 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 10:07:42.729476 kubelet[2015]: I0209 10:07:42.729380 2015 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 10:07:42.733038 kubelet[2015]: E0209 10:07:42.733015 2015 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 10:07:42.760114 kubelet[2015]: I0209 10:07:42.760067 2015 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:07:42.760114 kubelet[2015]: I0209 10:07:42.760093 2015 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:07:42.760114 kubelet[2015]: I0209 10:07:42.760113 2015 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:07:42.760308 kubelet[2015]: I0209 10:07:42.760286 2015 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 10:07:42.760308 kubelet[2015]: I0209 10:07:42.760306 2015 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 10:07:42.760383 kubelet[2015]: I0209 10:07:42.760314 2015 policy_none.go:49] "None policy: Start" Feb 9 10:07:42.760775 kubelet[2015]: I0209 10:07:42.760751 2015 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:07:42.760803 kubelet[2015]: I0209 10:07:42.760776 2015 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:07:42.760950 kubelet[2015]: I0209 10:07:42.760927 2015 state_mem.go:75] "Updated machine memory state" Feb 9 10:07:42.764133 kubelet[2015]: I0209 10:07:42.764114 2015 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:07:42.762000 audit[2015]: AVC avc: denied { mac_admin } for pid=2015 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:42.762000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:07:42.762000 audit[2015]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004c58c0 a1=40009747f8 a2=40004c5890 a3=25 items=0 ppid=1 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:42.762000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:07:42.766413 kubelet[2015]: I0209 10:07:42.766395 2015 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:07:42.766760 kubelet[2015]: I0209 10:07:42.766747 2015 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:07:42.802208 kubelet[2015]: I0209 10:07:42.802186 2015 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:07:42.808982 kubelet[2015]: I0209 10:07:42.808942 2015 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 9 10:07:42.809079 kubelet[2015]: I0209 10:07:42.809022 2015 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 10:07:42.833785 kubelet[2015]: I0209 10:07:42.833719 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:42.833860 kubelet[2015]: I0209 10:07:42.833816 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:42.833860 kubelet[2015]: I0209 10:07:42.833846 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:42.838598 kubelet[2015]: E0209 10:07:42.838577 2015 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:43.002554 kubelet[2015]: I0209 10:07:43.002526 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/059119f1162e6a5dd910a0f7b370c964-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"059119f1162e6a5dd910a0f7b370c964\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:43.002710 kubelet[2015]: I0209 10:07:43.002698 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:43.002783 kubelet[2015]: I0209 10:07:43.002774 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:43.002875 kubelet[2015]: I0209 10:07:43.002864 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:43.002950 kubelet[2015]: I0209 10:07:43.002940 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/059119f1162e6a5dd910a0f7b370c964-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"059119f1162e6a5dd910a0f7b370c964\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:43.003042 kubelet[2015]: I0209 10:07:43.003032 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/059119f1162e6a5dd910a0f7b370c964-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"059119f1162e6a5dd910a0f7b370c964\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:43.003114 kubelet[2015]: I0209 10:07:43.003105 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:43.003178 kubelet[2015]: I0209 10:07:43.003169 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:43.003265 kubelet[2015]: I0209 10:07:43.003237 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 9 10:07:43.140686 kubelet[2015]: E0209 10:07:43.140635 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:43.141119 kubelet[2015]: E0209 10:07:43.141088 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:43.141597 kubelet[2015]: E0209 10:07:43.141576 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:43.426000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:43.426000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d31a00 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:43.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:43.427000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:43.427000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:43.427000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400122df60 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:43.427000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000eec340 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:43.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:43.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:43.427000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:07:43.427000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000eec360 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:43.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:43.687129 kubelet[2015]: I0209 10:07:43.687098 2015 apiserver.go:52] "Watching apiserver" Feb 9 10:07:43.701365 kubelet[2015]: I0209 10:07:43.701336 2015 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 10:07:43.706637 kubelet[2015]: I0209 10:07:43.706605 2015 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:07:43.748632 kubelet[2015]: E0209 10:07:43.748595 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:43.755734 kubelet[2015]: E0209 10:07:43.755702 2015 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 9 10:07:43.756124 kubelet[2015]: E0209 10:07:43.755703 2015 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 9 10:07:43.756312 kubelet[2015]: E0209 10:07:43.756293 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:43.756492 kubelet[2015]: E0209 10:07:43.756474 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:43.816634 kubelet[2015]: I0209 10:07:43.816596 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.8165562610000001 podCreationTimestamp="2024-02-09 10:07:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:07:43.800974789 +0000 UTC m=+1.197271528" watchObservedRunningTime="2024-02-09 10:07:43.816556261 +0000 UTC m=+1.212852960" Feb 9 10:07:43.847009 kubelet[2015]: I0209 10:07:43.846975 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.84694045 podCreationTimestamp="2024-02-09 10:07:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:07:43.81705858 +0000 UTC m=+1.213355319" watchObservedRunningTime="2024-02-09 10:07:43.84694045 +0000 UTC m=+1.243237189" Feb 9 10:07:43.847149 kubelet[2015]: I0209 10:07:43.847045 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.847030571 podCreationTimestamp="2024-02-09 10:07:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:07:43.82958094 +0000 UTC m=+1.225877639" watchObservedRunningTime="2024-02-09 10:07:43.847030571 +0000 UTC m=+1.243327310" Feb 9 10:07:44.749809 kubelet[2015]: E0209 10:07:44.749764 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:44.750132 kubelet[2015]: E0209 10:07:44.749918 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:45.336857 kubelet[2015]: E0209 10:07:45.336815 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:47.476371 sudo[1275]: pam_unix(sudo:session): session closed for user root Feb 9 10:07:47.476000 audit[1275]: USER_END pid=1275 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:47.476000 audit[1275]: CRED_DISP pid=1275 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:07:47.477648 sshd[1271]: pam_unix(sshd:session): session closed for user core Feb 9 10:07:47.478000 audit[1271]: USER_END pid=1271 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:47.478000 audit[1271]: CRED_DISP pid=1271 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:07:47.479945 systemd[1]: sshd@6-10.0.0.126:22-10.0.0.1:54458.service: Deactivated successfully. Feb 9 10:07:47.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.126:22-10.0.0.1:54458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:07:47.480664 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:07:47.480839 systemd[1]: session-7.scope: Consumed 5.309s CPU time. Feb 9 10:07:47.481196 systemd-logind[1132]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:07:47.482068 systemd-logind[1132]: Removed session 7. Feb 9 10:07:47.977023 kubelet[2015]: E0209 10:07:47.976975 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:49.106988 kubelet[2015]: E0209 10:07:49.106888 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:49.759532 kubelet[2015]: E0209 10:07:49.759508 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:54.764000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:07:54.768253 kernel: kauditd_printk_skb: 267 callbacks suppressed Feb 9 10:07:54.768352 kernel: audit: type=1400 audit(1707473274.764:944): avc: denied { watch } for pid=1901 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:07:54.768378 kernel: audit: type=1300 audit(1707473274.764:944): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009b4680 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:54.764000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009b4680 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:07:54.771227 kernel: audit: type=1327 audit(1707473274.764:944): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:54.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:07:55.344595 kubelet[2015]: E0209 10:07:55.344561 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:56.305415 kubelet[2015]: I0209 10:07:56.305383 2015 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 10:07:56.305767 env[1146]: time="2024-02-09T10:07:56.305728061Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 10:07:56.306235 kubelet[2015]: I0209 10:07:56.306211 2015 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 10:07:57.153588 kubelet[2015]: I0209 10:07:57.153544 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:57.158438 systemd[1]: Created slice kubepods-besteffort-podf6dec97b_5e13_42b2_bc60_b48da25824cf.slice. Feb 9 10:07:57.297318 kubelet[2015]: I0209 10:07:57.297280 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f6dec97b-5e13-42b2-bc60-b48da25824cf-lib-modules\") pod \"kube-proxy-t72hm\" (UID: \"f6dec97b-5e13-42b2-bc60-b48da25824cf\") " pod="kube-system/kube-proxy-t72hm" Feb 9 10:07:57.297318 kubelet[2015]: I0209 10:07:57.297329 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f6dec97b-5e13-42b2-bc60-b48da25824cf-kube-proxy\") pod \"kube-proxy-t72hm\" (UID: \"f6dec97b-5e13-42b2-bc60-b48da25824cf\") " pod="kube-system/kube-proxy-t72hm" Feb 9 10:07:57.297477 kubelet[2015]: I0209 10:07:57.297365 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f6dec97b-5e13-42b2-bc60-b48da25824cf-xtables-lock\") pod \"kube-proxy-t72hm\" (UID: \"f6dec97b-5e13-42b2-bc60-b48da25824cf\") " pod="kube-system/kube-proxy-t72hm" Feb 9 10:07:57.297477 kubelet[2015]: I0209 10:07:57.297395 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5z8w8\" (UniqueName: \"kubernetes.io/projected/f6dec97b-5e13-42b2-bc60-b48da25824cf-kube-api-access-5z8w8\") pod \"kube-proxy-t72hm\" (UID: \"f6dec97b-5e13-42b2-bc60-b48da25824cf\") " pod="kube-system/kube-proxy-t72hm" Feb 9 10:07:57.316510 kubelet[2015]: I0209 10:07:57.316468 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:07:57.321555 systemd[1]: Created slice kubepods-besteffort-podd74fd603_50e6_4020_b761_beaaae0e3405.slice. Feb 9 10:07:57.470261 kubelet[2015]: E0209 10:07:57.470222 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:57.470747 env[1146]: time="2024-02-09T10:07:57.470705460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t72hm,Uid:f6dec97b-5e13-42b2-bc60-b48da25824cf,Namespace:kube-system,Attempt:0,}" Feb 9 10:07:57.485234 env[1146]: time="2024-02-09T10:07:57.485172305Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:07:57.485372 env[1146]: time="2024-02-09T10:07:57.485211952Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:07:57.485372 env[1146]: time="2024-02-09T10:07:57.485222954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:07:57.485580 env[1146]: time="2024-02-09T10:07:57.485532766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4bac16b748d57dffa13582e245d99a3572df193e8febf3d21e99b09c357f9f64 pid=2109 runtime=io.containerd.runc.v2 Feb 9 10:07:57.499395 kubelet[2015]: I0209 10:07:57.499280 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d74fd603-50e6-4020-b761-beaaae0e3405-var-lib-calico\") pod \"tigera-operator-7ff8dc855-8zttn\" (UID: \"d74fd603-50e6-4020-b761-beaaae0e3405\") " pod="tigera-operator/tigera-operator-7ff8dc855-8zttn" Feb 9 10:07:57.499395 kubelet[2015]: I0209 10:07:57.499327 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k6gsb\" (UniqueName: \"kubernetes.io/projected/d74fd603-50e6-4020-b761-beaaae0e3405-kube-api-access-k6gsb\") pod \"tigera-operator-7ff8dc855-8zttn\" (UID: \"d74fd603-50e6-4020-b761-beaaae0e3405\") " pod="tigera-operator/tigera-operator-7ff8dc855-8zttn" Feb 9 10:07:57.499727 systemd[1]: Started cri-containerd-4bac16b748d57dffa13582e245d99a3572df193e8febf3d21e99b09c357f9f64.scope. Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583784 kernel: audit: type=1400 audit(1707473277.578:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583845 kernel: audit: type=1400 audit(1707473277.578:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583869 kernel: audit: type=1400 audit(1707473277.578:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.587626 kernel: audit: type=1400 audit(1707473277.578:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.587674 kernel: audit: type=1400 audit(1707473277.578:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.591596 kernel: audit: type=1400 audit(1707473277.578:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.591646 kernel: audit: type=1400 audit(1707473277.578:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit: BPF prog-id=109 op=LOAD Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2109 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462616331366237343864353764666661313335383265323435643939 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2109 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462616331366237343864353764666661313335383265323435643939 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.578000 audit: BPF prog-id=110 op=LOAD Feb 9 10:07:57.578000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2109 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462616331366237343864353764666661313335383265323435643939 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.581000 audit: BPF prog-id=111 op=LOAD Feb 9 10:07:57.581000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2109 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462616331366237343864353764666661313335383265323435643939 Feb 9 10:07:57.583000 audit: BPF prog-id=111 op=UNLOAD Feb 9 10:07:57.583000 audit: BPF prog-id=110 op=UNLOAD Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.583000 audit: BPF prog-id=112 op=LOAD Feb 9 10:07:57.583000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2109 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462616331366237343864353764666661313335383265323435643939 Feb 9 10:07:57.606333 env[1146]: time="2024-02-09T10:07:57.605597700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t72hm,Uid:f6dec97b-5e13-42b2-bc60-b48da25824cf,Namespace:kube-system,Attempt:0,} returns sandbox id \"4bac16b748d57dffa13582e245d99a3572df193e8febf3d21e99b09c357f9f64\"" Feb 9 10:07:57.606429 kubelet[2015]: E0209 10:07:57.606281 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:57.609298 env[1146]: time="2024-02-09T10:07:57.609112214Z" level=info msg="CreateContainer within sandbox \"4bac16b748d57dffa13582e245d99a3572df193e8febf3d21e99b09c357f9f64\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 10:07:57.624483 env[1146]: time="2024-02-09T10:07:57.624437845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-8zttn,Uid:d74fd603-50e6-4020-b761-beaaae0e3405,Namespace:tigera-operator,Attempt:0,}" Feb 9 10:07:57.628105 env[1146]: time="2024-02-09T10:07:57.628059097Z" level=info msg="CreateContainer within sandbox \"4bac16b748d57dffa13582e245d99a3572df193e8febf3d21e99b09c357f9f64\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e8da796439042cf68c111bd72b8c798ab64b3baa0f41e5f6ccab9e97b49993f5\"" Feb 9 10:07:57.628657 env[1146]: time="2024-02-09T10:07:57.628628873Z" level=info msg="StartContainer for \"e8da796439042cf68c111bd72b8c798ab64b3baa0f41e5f6ccab9e97b49993f5\"" Feb 9 10:07:57.644374 env[1146]: time="2024-02-09T10:07:57.644302202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:07:57.644995 systemd[1]: Started cri-containerd-e8da796439042cf68c111bd72b8c798ab64b3baa0f41e5f6ccab9e97b49993f5.scope. Feb 9 10:07:57.645681 env[1146]: time="2024-02-09T10:07:57.645621105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:07:57.645774 env[1146]: time="2024-02-09T10:07:57.645670154Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:07:57.646124 env[1146]: time="2024-02-09T10:07:57.646088304Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4471c577b0d8f25f7869a5b2ecca2427eaab09f3abebcd4a0d0a935dad47796 pid=2164 runtime=io.containerd.runc.v2 Feb 9 10:07:57.661234 systemd[1]: Started cri-containerd-a4471c577b0d8f25f7869a5b2ecca2427eaab09f3abebcd4a0d0a935dad47796.scope. Feb 9 10:07:57.681000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.681000 audit[2150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2109 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538646137393634333930343263663638633131316264373262386337 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit: BPF prog-id=113 op=LOAD Feb 9 10:07:57.682000 audit[2150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2109 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538646137393634333930343263663638633131316264373262386337 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.682000 audit: BPF prog-id=114 op=LOAD Feb 9 10:07:57.682000 audit[2150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2109 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538646137393634333930343263663638633131316264373262386337 Feb 9 10:07:57.683000 audit: BPF prog-id=114 op=UNLOAD Feb 9 10:07:57.683000 audit: BPF prog-id=113 op=UNLOAD Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.683000 audit: BPF prog-id=115 op=LOAD Feb 9 10:07:57.683000 audit[2150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2109 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538646137393634333930343263663638633131316264373262386337 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit: BPF prog-id=116 op=LOAD Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2164 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343731633537376230643866323566373836396135623265636361 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2164 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343731633537376230643866323566373836396135623265636361 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.699000 audit: BPF prog-id=117 op=LOAD Feb 9 10:07:57.699000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2164 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343731633537376230643866323566373836396135623265636361 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit: BPF prog-id=118 op=LOAD Feb 9 10:07:57.700000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2164 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343731633537376230643866323566373836396135623265636361 Feb 9 10:07:57.700000 audit: BPF prog-id=118 op=UNLOAD Feb 9 10:07:57.700000 audit: BPF prog-id=117 op=UNLOAD Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:57.700000 audit: BPF prog-id=119 op=LOAD Feb 9 10:07:57.700000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2164 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134343731633537376230643866323566373836396135623265636361 Feb 9 10:07:57.717298 env[1146]: time="2024-02-09T10:07:57.717227209Z" level=info msg="StartContainer for \"e8da796439042cf68c111bd72b8c798ab64b3baa0f41e5f6ccab9e97b49993f5\" returns successfully" Feb 9 10:07:57.731436 env[1146]: time="2024-02-09T10:07:57.726116511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-8zttn,Uid:d74fd603-50e6-4020-b761-beaaae0e3405,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a4471c577b0d8f25f7869a5b2ecca2427eaab09f3abebcd4a0d0a935dad47796\"" Feb 9 10:07:57.733541 env[1146]: time="2024-02-09T10:07:57.733513042Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 10:07:57.772678 kubelet[2015]: E0209 10:07:57.772648 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:57.838000 audit[2241]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.838000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc417d40 a2=0 a3=ffff9a8196c0 items=0 ppid=2184 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:07:57.838000 audit[2242]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:57.838000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3c830b0 a2=0 a3=ffffb70006c0 items=0 ppid=2184 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:07:57.839000 audit[2243]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.839000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2233370 a2=0 a3=ffffbed936c0 items=0 ppid=2184 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:07:57.840000 audit[2244]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:57.840000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed2394c0 a2=0 a3=ffff897746c0 items=0 ppid=2184 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:07:57.840000 audit[2245]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.840000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeced32b0 a2=0 a3=ffffbca526c0 items=0 ppid=2184 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:07:57.845000 audit[2247]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:57.845000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd650ccf0 a2=0 a3=ffffada426c0 items=0 ppid=2184 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:07:57.943000 audit[2248]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.943000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff3c37420 a2=0 a3=ffff9a6136c0 items=0 ppid=2184 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:07:57.946000 audit[2250]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.946000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe29ba9b0 a2=0 a3=ffff873d96c0 items=0 ppid=2184 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 10:07:57.949000 audit[2253]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.949000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd47c4c40 a2=0 a3=ffffb56526c0 items=0 ppid=2184 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 10:07:57.950000 audit[2254]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.950000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcfa98960 a2=0 a3=ffffbb0f36c0 items=0 ppid=2184 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:07:57.952000 audit[2256]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.952000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffefd1240 a2=0 a3=ffffa35c66c0 items=0 ppid=2184 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:07:57.953000 audit[2257]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.953000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce7be110 a2=0 a3=ffff9c5816c0 items=0 ppid=2184 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:07:57.955000 audit[2259]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.955000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcf12cf30 a2=0 a3=ffff935166c0 items=0 ppid=2184 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:07:57.958000 audit[2262]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.958000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd28eeed0 a2=0 a3=ffffa88ad6c0 items=0 ppid=2184 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 10:07:57.959000 audit[2263]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.959000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd342ad60 a2=0 a3=ffff892376c0 items=0 ppid=2184 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:07:57.961000 audit[2265]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.961000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf6172a0 a2=0 a3=ffff87bae6c0 items=0 ppid=2184 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:07:57.962000 audit[2266]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.962000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd87770f0 a2=0 a3=ffff9ddf16c0 items=0 ppid=2184 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:07:57.964000 audit[2268]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.964000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2961060 a2=0 a3=ffffa76666c0 items=0 ppid=2184 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:07:57.967000 audit[2271]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.967000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca647ec0 a2=0 a3=ffffa30c16c0 items=0 ppid=2184 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:07:57.970000 audit[2274]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.970000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd04ff3a0 a2=0 a3=ffff895636c0 items=0 ppid=2184 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:07:57.971000 audit[2275]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.971000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6b05a40 a2=0 a3=ffffa6df76c0 items=0 ppid=2184 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:07:57.973000 audit[2277]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.973000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdc6c3b30 a2=0 a3=ffff8a91c6c0 items=0 ppid=2184 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:07:57.977000 audit[2280]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.977000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff941a8b0 a2=0 a3=ffffa02a36c0 items=0 ppid=2184 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:07:57.982000 audit[2285]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.982000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6114120 a2=0 a3=ffff8972f6c0 items=0 ppid=2184 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:07:57.986740 kubelet[2015]: E0209 10:07:57.986292 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:07:57.985000 audit[2287]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:07:57.985000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffeb3b1790 a2=0 a3=ffff88f7d6c0 items=0 ppid=2184 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:07:57.998688 kubelet[2015]: I0209 10:07:57.998432 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-t72hm" podStartSLOduration=0.998390893 podCreationTimestamp="2024-02-09 10:07:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:07:57.782443712 +0000 UTC m=+15.178740451" watchObservedRunningTime="2024-02-09 10:07:57.998390893 +0000 UTC m=+15.394687592" Feb 9 10:07:57.998000 audit[2289]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:07:57.998000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff62599b0 a2=0 a3=ffffa06fe6c0 items=0 ppid=2184 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:57.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:07:58.003000 audit[2289]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:07:58.003000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff62599b0 a2=0 a3=ffffa06fe6c0 items=0 ppid=2184 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:07:58.008000 audit[2295]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.008000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd85fb480 a2=0 a3=ffff9bc3d6c0 items=0 ppid=2184 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:07:58.010000 audit[2297]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.010000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe96bbea0 a2=0 a3=ffff8a0d96c0 items=0 ppid=2184 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 10:07:58.014000 audit[2300]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.014000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc0a25800 a2=0 a3=ffff8f2b46c0 items=0 ppid=2184 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 10:07:58.016611 update_engine[1134]: I0209 10:07:58.016276 1134 update_attempter.cc:509] Updating boot flags... Feb 9 10:07:58.015000 audit[2301]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.015000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4d5b710 a2=0 a3=ffffaf9266c0 items=0 ppid=2184 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:07:58.018000 audit[2305]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.018000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffff01d3e0 a2=0 a3=ffff843116c0 items=0 ppid=2184 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:07:58.019000 audit[2306]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.019000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe74b3200 a2=0 a3=ffff972cf6c0 items=0 ppid=2184 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:07:58.021000 audit[2309]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.021000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff4148380 a2=0 a3=ffff897e86c0 items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 10:07:58.029000 audit[2314]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.029000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff3e0eb40 a2=0 a3=ffff87ebb6c0 items=0 ppid=2184 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:07:58.032000 audit[2316]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.032000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff67c7e0 a2=0 a3=ffffbbebc6c0 items=0 ppid=2184 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:07:58.039000 audit[2323]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.039000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd0e9630 a2=0 a3=ffff88f8f6c0 items=0 ppid=2184 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:07:58.042000 audit[2324]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.042000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc73d47e0 a2=0 a3=ffff803966c0 items=0 ppid=2184 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:07:58.044000 audit[2326]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.044000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7188cc0 a2=0 a3=ffff99f706c0 items=0 ppid=2184 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:07:58.051000 audit[2329]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.051000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffaa8aa60 a2=0 a3=ffffb67966c0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:07:58.055000 audit[2332]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.055000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc23a0d70 a2=0 a3=ffffada736c0 items=0 ppid=2184 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 10:07:58.058000 audit[2333]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.058000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffbe8c4c0 a2=0 a3=ffff83f366c0 items=0 ppid=2184 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:07:58.068000 audit[2335]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.068000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc9235220 a2=0 a3=ffff915626c0 items=0 ppid=2184 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:07:58.073000 audit[2339]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.073000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe492b6b0 a2=0 a3=ffff995076c0 items=0 ppid=2184 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:07:58.074000 audit[2340]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.074000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5f5f340 a2=0 a3=ffff9aea46c0 items=0 ppid=2184 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:07:58.076000 audit[2342]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.076000 audit[2342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffae690a0 a2=0 a3=ffff993de6c0 items=0 ppid=2184 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:07:58.081000 audit[2345]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.081000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdd66e820 a2=0 a3=ffffb5b556c0 items=0 ppid=2184 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:07:58.082000 audit[2346]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.082000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe97ff140 a2=0 a3=ffffbdbd86c0 items=0 ppid=2184 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:07:58.084000 audit[2348]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:07:58.084000 audit[2348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff4e76760 a2=0 a3=ffff973c66c0 items=0 ppid=2184 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:07:58.087000 audit[2350]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:07:58.087000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffce20c50 a2=0 a3=ffffac38c6c0 items=0 ppid=2184 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.087000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:07:58.088000 audit[2350]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:07:58.088000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffffce20c50 a2=0 a3=ffffac38c6c0 items=0 ppid=2184 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:58.088000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:07:58.981926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1441626966.mount: Deactivated successfully. Feb 9 10:07:59.451007 env[1146]: time="2024-02-09T10:07:59.450958309Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:59.453184 env[1146]: time="2024-02-09T10:07:59.453151204Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:59.458504 env[1146]: time="2024-02-09T10:07:59.455165472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:59.464427 env[1146]: time="2024-02-09T10:07:59.461091778Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:07:59.464427 env[1146]: time="2024-02-09T10:07:59.461583093Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 10:07:59.466275 env[1146]: time="2024-02-09T10:07:59.466227364Z" level=info msg="CreateContainer within sandbox \"a4471c577b0d8f25f7869a5b2ecca2427eaab09f3abebcd4a0d0a935dad47796\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 10:07:59.478735 env[1146]: time="2024-02-09T10:07:59.478695630Z" level=info msg="CreateContainer within sandbox \"a4471c577b0d8f25f7869a5b2ecca2427eaab09f3abebcd4a0d0a935dad47796\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e8aa7f449e6777e5e5f3180f49cd531df147098c01d3935d0c6b4a4ec5800832\"" Feb 9 10:07:59.480413 env[1146]: time="2024-02-09T10:07:59.479390657Z" level=info msg="StartContainer for \"e8aa7f449e6777e5e5f3180f49cd531df147098c01d3935d0c6b4a4ec5800832\"" Feb 9 10:07:59.498556 systemd[1]: Started cri-containerd-e8aa7f449e6777e5e5f3180f49cd531df147098c01d3935d0c6b4a4ec5800832.scope. Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit: BPF prog-id=120 op=LOAD Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2164 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:59.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616137663434396536373737653565356633313830663439636435 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2164 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:59.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616137663434396536373737653565356633313830663439636435 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.525000 audit: BPF prog-id=121 op=LOAD Feb 9 10:07:59.525000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2164 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:59.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616137663434396536373737653565356633313830663439636435 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit: BPF prog-id=122 op=LOAD Feb 9 10:07:59.526000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2164 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:59.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616137663434396536373737653565356633313830663439636435 Feb 9 10:07:59.526000 audit: BPF prog-id=122 op=UNLOAD Feb 9 10:07:59.526000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:07:59.526000 audit: BPF prog-id=123 op=LOAD Feb 9 10:07:59.526000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2164 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:07:59.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538616137663434396536373737653565356633313830663439636435 Feb 9 10:07:59.544891 env[1146]: time="2024-02-09T10:07:59.542382690Z" level=info msg="StartContainer for \"e8aa7f449e6777e5e5f3180f49cd531df147098c01d3935d0c6b4a4ec5800832\" returns successfully" Feb 9 10:08:02.234000 audit[2391]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.237188 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 9 10:08:02.237255 kernel: audit: type=1325 audit(1707473282.234:1056): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.234000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd168b030 a2=0 a3=ffff8ee756c0 items=0 ppid=2184 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.241460 kernel: audit: type=1300 audit(1707473282.234:1056): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd168b030 a2=0 a3=ffff8ee756c0 items=0 ppid=2184 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.241509 kernel: audit: type=1327 audit(1707473282.234:1056): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.238000 audit[2391]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.238000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd168b030 a2=0 a3=ffff8ee756c0 items=0 ppid=2184 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.248470 kernel: audit: type=1325 audit(1707473282.238:1057): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.248521 kernel: audit: type=1300 audit(1707473282.238:1057): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd168b030 a2=0 a3=ffff8ee756c0 items=0 ppid=2184 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.248539 kernel: audit: type=1327 audit(1707473282.238:1057): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.248000 audit[2393]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.248000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdb362c20 a2=0 a3=ffffaa8966c0 items=0 ppid=2184 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.254473 kernel: audit: type=1325 audit(1707473282.248:1058): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.254522 kernel: audit: type=1300 audit(1707473282.248:1058): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdb362c20 a2=0 a3=ffffaa8966c0 items=0 ppid=2184 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.254576 kernel: audit: type=1327 audit(1707473282.248:1058): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.250000 audit[2393]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.250000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdb362c20 a2=0 a3=ffffaa8966c0 items=0 ppid=2184 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:02.263262 kernel: audit: type=1325 audit(1707473282.250:1059): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:02.353261 kubelet[2015]: I0209 10:08:02.353183 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-8zttn" podStartSLOduration=3.6210196310000002 podCreationTimestamp="2024-02-09 10:07:57 +0000 UTC" firstStartedPulling="2024-02-09 10:07:57.732586205 +0000 UTC m=+15.128882944" lastFinishedPulling="2024-02-09 10:07:59.464709372 +0000 UTC m=+16.861006111" observedRunningTime="2024-02-09 10:07:59.790001758 +0000 UTC m=+17.186298497" watchObservedRunningTime="2024-02-09 10:08:02.353142798 +0000 UTC m=+19.749439537" Feb 9 10:08:02.353709 kubelet[2015]: I0209 10:08:02.353344 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:08:02.358299 systemd[1]: Created slice kubepods-besteffort-podddfaf94b_ea6e_4511_8f40_c3f2cc018794.slice. Feb 9 10:08:02.397553 kubelet[2015]: I0209 10:08:02.397516 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:08:02.402379 systemd[1]: Created slice kubepods-besteffort-pod288194ed_5860_49a4_9182_794dda94c9a3.slice. Feb 9 10:08:02.432027 kubelet[2015]: I0209 10:08:02.431979 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ddfaf94b-ea6e-4511-8f40-c3f2cc018794-typha-certs\") pod \"calico-typha-7d75ccb77f-ffq9x\" (UID: \"ddfaf94b-ea6e-4511-8f40-c3f2cc018794\") " pod="calico-system/calico-typha-7d75ccb77f-ffq9x" Feb 9 10:08:02.432257 kubelet[2015]: I0209 10:08:02.432218 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-77x5j\" (UniqueName: \"kubernetes.io/projected/ddfaf94b-ea6e-4511-8f40-c3f2cc018794-kube-api-access-77x5j\") pod \"calico-typha-7d75ccb77f-ffq9x\" (UID: \"ddfaf94b-ea6e-4511-8f40-c3f2cc018794\") " pod="calico-system/calico-typha-7d75ccb77f-ffq9x" Feb 9 10:08:02.432362 kubelet[2015]: I0209 10:08:02.432350 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/288194ed-5860-49a4-9182-794dda94c9a3-node-certs\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432438 kubelet[2015]: I0209 10:08:02.432428 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-flexvol-driver-host\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432554 kubelet[2015]: I0209 10:08:02.432542 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-xtables-lock\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432680 kubelet[2015]: I0209 10:08:02.432654 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-lib-modules\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432723 kubelet[2015]: I0209 10:08:02.432692 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-policysync\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432723 kubelet[2015]: I0209 10:08:02.432714 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/288194ed-5860-49a4-9182-794dda94c9a3-tigera-ca-bundle\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432770 kubelet[2015]: I0209 10:08:02.432732 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-var-run-calico\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432770 kubelet[2015]: I0209 10:08:02.432751 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-cni-bin-dir\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432827 kubelet[2015]: I0209 10:08:02.432773 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-var-lib-calico\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432827 kubelet[2015]: I0209 10:08:02.432794 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ddfaf94b-ea6e-4511-8f40-c3f2cc018794-tigera-ca-bundle\") pod \"calico-typha-7d75ccb77f-ffq9x\" (UID: \"ddfaf94b-ea6e-4511-8f40-c3f2cc018794\") " pod="calico-system/calico-typha-7d75ccb77f-ffq9x" Feb 9 10:08:02.432827 kubelet[2015]: I0209 10:08:02.432813 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w4wcd\" (UniqueName: \"kubernetes.io/projected/288194ed-5860-49a4-9182-794dda94c9a3-kube-api-access-w4wcd\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432913 kubelet[2015]: I0209 10:08:02.432832 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-cni-net-dir\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.432913 kubelet[2015]: I0209 10:08:02.432859 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/288194ed-5860-49a4-9182-794dda94c9a3-cni-log-dir\") pod \"calico-node-cp64c\" (UID: \"288194ed-5860-49a4-9182-794dda94c9a3\") " pod="calico-system/calico-node-cp64c" Feb 9 10:08:02.510309 kubelet[2015]: I0209 10:08:02.510178 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:08:02.510906 kubelet[2015]: E0209 10:08:02.510879 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:02.533894 kubelet[2015]: I0209 10:08:02.533848 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4456e44a-abbe-4da2-85d0-ed59b572ad98-varrun\") pod \"csi-node-driver-p9jm6\" (UID: \"4456e44a-abbe-4da2-85d0-ed59b572ad98\") " pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:02.534018 kubelet[2015]: I0209 10:08:02.533910 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4456e44a-abbe-4da2-85d0-ed59b572ad98-kubelet-dir\") pod \"csi-node-driver-p9jm6\" (UID: \"4456e44a-abbe-4da2-85d0-ed59b572ad98\") " pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:02.534916 kubelet[2015]: I0209 10:08:02.534884 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-84466\" (UniqueName: \"kubernetes.io/projected/4456e44a-abbe-4da2-85d0-ed59b572ad98-kube-api-access-84466\") pod \"csi-node-driver-p9jm6\" (UID: \"4456e44a-abbe-4da2-85d0-ed59b572ad98\") " pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:02.535022 kubelet[2015]: I0209 10:08:02.534926 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4456e44a-abbe-4da2-85d0-ed59b572ad98-registration-dir\") pod \"csi-node-driver-p9jm6\" (UID: \"4456e44a-abbe-4da2-85d0-ed59b572ad98\") " pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:02.535050 kubelet[2015]: I0209 10:08:02.535035 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4456e44a-abbe-4da2-85d0-ed59b572ad98-socket-dir\") pod \"csi-node-driver-p9jm6\" (UID: \"4456e44a-abbe-4da2-85d0-ed59b572ad98\") " pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:02.539913 kubelet[2015]: E0209 10:08:02.539890 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.540280 kubelet[2015]: W0209 10:08:02.540239 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.540382 kubelet[2015]: E0209 10:08:02.540369 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.548384 kubelet[2015]: E0209 10:08:02.548352 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.548384 kubelet[2015]: W0209 10:08:02.548374 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.548707 kubelet[2015]: E0209 10:08:02.548396 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.548814 kubelet[2015]: E0209 10:08:02.548787 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.548852 kubelet[2015]: W0209 10:08:02.548805 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.548891 kubelet[2015]: E0209 10:08:02.548854 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.550723 kubelet[2015]: E0209 10:08:02.550698 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.550795 kubelet[2015]: W0209 10:08:02.550728 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.550795 kubelet[2015]: E0209 10:08:02.550752 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.551722 kubelet[2015]: E0209 10:08:02.551693 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.551830 kubelet[2015]: W0209 10:08:02.551713 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.551830 kubelet[2015]: E0209 10:08:02.551753 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.556647 kubelet[2015]: E0209 10:08:02.556602 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.556647 kubelet[2015]: W0209 10:08:02.556641 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.556816 kubelet[2015]: E0209 10:08:02.556661 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.557404 kubelet[2015]: E0209 10:08:02.557387 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.557492 kubelet[2015]: W0209 10:08:02.557476 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.557565 kubelet[2015]: E0209 10:08:02.557542 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.561725 kubelet[2015]: E0209 10:08:02.561709 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.561810 kubelet[2015]: W0209 10:08:02.561798 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.561884 kubelet[2015]: E0209 10:08:02.561862 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.564446 kubelet[2015]: E0209 10:08:02.564424 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.564446 kubelet[2015]: W0209 10:08:02.564441 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.564539 kubelet[2015]: E0209 10:08:02.564462 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.564714 kubelet[2015]: E0209 10:08:02.564659 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.564714 kubelet[2015]: W0209 10:08:02.564668 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.564714 kubelet[2015]: E0209 10:08:02.564680 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.569342 kubelet[2015]: E0209 10:08:02.569324 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.569436 kubelet[2015]: W0209 10:08:02.569416 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.569496 kubelet[2015]: E0209 10:08:02.569486 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.635681 kubelet[2015]: E0209 10:08:02.635651 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.635681 kubelet[2015]: W0209 10:08:02.635673 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.635957 kubelet[2015]: E0209 10:08:02.635696 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.636039 kubelet[2015]: E0209 10:08:02.635960 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.636039 kubelet[2015]: W0209 10:08:02.635971 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.636039 kubelet[2015]: E0209 10:08:02.635995 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.636234 kubelet[2015]: E0209 10:08:02.636205 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.636234 kubelet[2015]: W0209 10:08:02.636221 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.636312 kubelet[2015]: E0209 10:08:02.636240 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.636528 kubelet[2015]: E0209 10:08:02.636514 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.636528 kubelet[2015]: W0209 10:08:02.636526 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.636602 kubelet[2015]: E0209 10:08:02.636540 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.636697 kubelet[2015]: E0209 10:08:02.636684 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.636727 kubelet[2015]: W0209 10:08:02.636700 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.636727 kubelet[2015]: E0209 10:08:02.636711 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.636967 kubelet[2015]: E0209 10:08:02.636944 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.636967 kubelet[2015]: W0209 10:08:02.636955 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.636967 kubelet[2015]: E0209 10:08:02.636968 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.637144 kubelet[2015]: E0209 10:08:02.637122 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.637144 kubelet[2015]: W0209 10:08:02.637132 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.637144 kubelet[2015]: E0209 10:08:02.637145 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.637348 kubelet[2015]: E0209 10:08:02.637332 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.637348 kubelet[2015]: W0209 10:08:02.637342 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.637416 kubelet[2015]: E0209 10:08:02.637385 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.637497 kubelet[2015]: E0209 10:08:02.637475 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.637497 kubelet[2015]: W0209 10:08:02.637485 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.637554 kubelet[2015]: E0209 10:08:02.637522 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.637630 kubelet[2015]: E0209 10:08:02.637614 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.637630 kubelet[2015]: W0209 10:08:02.637623 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.637689 kubelet[2015]: E0209 10:08:02.637637 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.637794 kubelet[2015]: E0209 10:08:02.637781 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.637794 kubelet[2015]: W0209 10:08:02.637790 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.637855 kubelet[2015]: E0209 10:08:02.637800 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.637951 kubelet[2015]: E0209 10:08:02.637935 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.637951 kubelet[2015]: W0209 10:08:02.637945 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.637951 kubelet[2015]: E0209 10:08:02.637958 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.638122 kubelet[2015]: E0209 10:08:02.638107 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.638122 kubelet[2015]: W0209 10:08:02.638116 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.638182 kubelet[2015]: E0209 10:08:02.638127 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.638453 kubelet[2015]: E0209 10:08:02.638437 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.638541 kubelet[2015]: W0209 10:08:02.638528 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.638615 kubelet[2015]: E0209 10:08:02.638603 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.638803 kubelet[2015]: E0209 10:08:02.638776 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.638803 kubelet[2015]: W0209 10:08:02.638790 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.638873 kubelet[2015]: E0209 10:08:02.638813 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.638983 kubelet[2015]: E0209 10:08:02.638963 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.638983 kubelet[2015]: W0209 10:08:02.638975 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.638983 kubelet[2015]: E0209 10:08:02.638985 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.639146 kubelet[2015]: E0209 10:08:02.639111 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.639146 kubelet[2015]: W0209 10:08:02.639128 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.639260 kubelet[2015]: E0209 10:08:02.639229 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.639349 kubelet[2015]: E0209 10:08:02.639292 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.639349 kubelet[2015]: W0209 10:08:02.639345 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.639416 kubelet[2015]: E0209 10:08:02.639411 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.640265 kubelet[2015]: E0209 10:08:02.639468 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.640265 kubelet[2015]: W0209 10:08:02.639477 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.640265 kubelet[2015]: E0209 10:08:02.639490 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.640265 kubelet[2015]: E0209 10:08:02.639613 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.640265 kubelet[2015]: W0209 10:08:02.639619 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.640265 kubelet[2015]: E0209 10:08:02.639629 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.640265 kubelet[2015]: E0209 10:08:02.640112 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.640265 kubelet[2015]: W0209 10:08:02.640124 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.640265 kubelet[2015]: E0209 10:08:02.640138 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.640541 kubelet[2015]: E0209 10:08:02.640516 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.640541 kubelet[2015]: W0209 10:08:02.640527 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.640541 kubelet[2015]: E0209 10:08:02.640540 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.640802 kubelet[2015]: E0209 10:08:02.640788 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.640802 kubelet[2015]: W0209 10:08:02.640802 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.640944 kubelet[2015]: E0209 10:08:02.640926 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.641099 kubelet[2015]: E0209 10:08:02.641082 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.641099 kubelet[2015]: W0209 10:08:02.641095 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.641221 kubelet[2015]: E0209 10:08:02.641207 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.641376 kubelet[2015]: E0209 10:08:02.641363 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.641376 kubelet[2015]: W0209 10:08:02.641376 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.641433 kubelet[2015]: E0209 10:08:02.641423 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.651860 kubelet[2015]: E0209 10:08:02.651341 2015 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:08:02.651860 kubelet[2015]: W0209 10:08:02.651363 2015 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:08:02.651860 kubelet[2015]: E0209 10:08:02.651379 2015 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:08:02.660589 kubelet[2015]: E0209 10:08:02.660565 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:02.661026 env[1146]: time="2024-02-09T10:08:02.660986264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d75ccb77f-ffq9x,Uid:ddfaf94b-ea6e-4511-8f40-c3f2cc018794,Namespace:calico-system,Attempt:0,}" Feb 9 10:08:02.705192 kubelet[2015]: E0209 10:08:02.705152 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:02.705626 env[1146]: time="2024-02-09T10:08:02.705585327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cp64c,Uid:288194ed-5860-49a4-9182-794dda94c9a3,Namespace:calico-system,Attempt:0,}" Feb 9 10:08:02.713407 env[1146]: time="2024-02-09T10:08:02.713062796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:08:02.713407 env[1146]: time="2024-02-09T10:08:02.713140047Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:08:02.713407 env[1146]: time="2024-02-09T10:08:02.713168330Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:08:02.713618 env[1146]: time="2024-02-09T10:08:02.713491253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b51b8ea85a09bf989274f67aceac93d247b0624e79947e762b249683607738d2 pid=2442 runtime=io.containerd.runc.v2 Feb 9 10:08:02.721977 env[1146]: time="2024-02-09T10:08:02.721809394Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:08:02.721977 env[1146]: time="2024-02-09T10:08:02.721903927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:08:02.721977 env[1146]: time="2024-02-09T10:08:02.721925449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:08:02.722190 env[1146]: time="2024-02-09T10:08:02.722139038Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee pid=2465 runtime=io.containerd.runc.v2 Feb 9 10:08:02.726061 systemd[1]: Started cri-containerd-b51b8ea85a09bf989274f67aceac93d247b0624e79947e762b249683607738d2.scope. Feb 9 10:08:02.749504 systemd[1]: Started cri-containerd-b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee.scope. Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.781000 audit: BPF prog-id=124 op=LOAD Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316238656138356130396266393839323734663637616365616339 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316238656138356130396266393839323734663637616365616339 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.782000 audit: BPF prog-id=125 op=LOAD Feb 9 10:08:02.782000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316238656138356130396266393839323734663637616365616339 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.788000 audit: BPF prog-id=126 op=LOAD Feb 9 10:08:02.788000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316238656138356130396266393839323734663637616365616339 Feb 9 10:08:02.789000 audit: BPF prog-id=126 op=UNLOAD Feb 9 10:08:02.789000 audit: BPF prog-id=125 op=UNLOAD Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.789000 audit: BPF prog-id=127 op=LOAD Feb 9 10:08:02.789000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316238656138356130396266393839323734663637616365616339 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit: BPF prog-id=128 op=LOAD Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2465 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316335653563623232336433613065316135323031356464376231 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2465 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316335653563623232336433613065316135323031356464376231 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.796000 audit: BPF prog-id=129 op=LOAD Feb 9 10:08:02.796000 audit[2480]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2465 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316335653563623232336433613065316135323031356464376231 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit: BPF prog-id=130 op=LOAD Feb 9 10:08:02.797000 audit[2480]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2465 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316335653563623232336433613065316135323031356464376231 Feb 9 10:08:02.797000 audit: BPF prog-id=130 op=UNLOAD Feb 9 10:08:02.797000 audit: BPF prog-id=129 op=UNLOAD Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:02.797000 audit: BPF prog-id=131 op=LOAD Feb 9 10:08:02.797000 audit[2480]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2465 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:02.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234316335653563623232336433613065316135323031356464376231 Feb 9 10:08:02.814300 env[1146]: time="2024-02-09T10:08:02.814234387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cp64c,Uid:288194ed-5860-49a4-9182-794dda94c9a3,Namespace:calico-system,Attempt:0,} returns sandbox id \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\"" Feb 9 10:08:02.814974 kubelet[2015]: E0209 10:08:02.814941 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:02.815707 env[1146]: time="2024-02-09T10:08:02.815678178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 10:08:02.826311 env[1146]: time="2024-02-09T10:08:02.826276541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d75ccb77f-ffq9x,Uid:ddfaf94b-ea6e-4511-8f40-c3f2cc018794,Namespace:calico-system,Attempt:0,} returns sandbox id \"b51b8ea85a09bf989274f67aceac93d247b0624e79947e762b249683607738d2\"" Feb 9 10:08:02.827262 kubelet[2015]: E0209 10:08:02.827229 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:03.270000 audit[2520]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2520 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:03.270000 audit[2520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc71f7250 a2=0 a3=ffff8a77e6c0 items=0 ppid=2184 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:03.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:03.270000 audit[2520]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2520 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:03.270000 audit[2520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc71f7250 a2=0 a3=ffff8a77e6c0 items=0 ppid=2184 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:03.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:03.730128 kubelet[2015]: E0209 10:08:03.730090 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:04.053289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2216043975.mount: Deactivated successfully. Feb 9 10:08:04.133651 env[1146]: time="2024-02-09T10:08:04.133611172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:04.135229 env[1146]: time="2024-02-09T10:08:04.135184362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:04.137367 env[1146]: time="2024-02-09T10:08:04.137332901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:04.138818 env[1146]: time="2024-02-09T10:08:04.138782196Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:04.139393 env[1146]: time="2024-02-09T10:08:04.139362946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 10:08:04.140230 env[1146]: time="2024-02-09T10:08:04.140204808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 10:08:04.142813 env[1146]: time="2024-02-09T10:08:04.142786879Z" level=info msg="CreateContainer within sandbox \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 10:08:04.152102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2915435495.mount: Deactivated successfully. Feb 9 10:08:04.155166 env[1146]: time="2024-02-09T10:08:04.155126889Z" level=info msg="CreateContainer within sandbox \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5\"" Feb 9 10:08:04.156851 env[1146]: time="2024-02-09T10:08:04.155693557Z" level=info msg="StartContainer for \"3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5\"" Feb 9 10:08:04.172186 systemd[1]: Started cri-containerd-3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5.scope. Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2465 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:04.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363261333466363337326639373563633032653364336530643030 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.194000 audit: BPF prog-id=132 op=LOAD Feb 9 10:08:04.194000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2465 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:04.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363261333466363337326639373563633032653364336530643030 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit: BPF prog-id=133 op=LOAD Feb 9 10:08:04.195000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2465 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:04.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363261333466363337326639373563633032653364336530643030 Feb 9 10:08:04.195000 audit: BPF prog-id=133 op=UNLOAD Feb 9 10:08:04.195000 audit: BPF prog-id=132 op=UNLOAD Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:04.195000 audit: BPF prog-id=134 op=LOAD Feb 9 10:08:04.195000 audit[2529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2465 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:04.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337363261333466363337326639373563633032653364336530643030 Feb 9 10:08:04.216964 systemd[1]: cri-containerd-3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5.scope: Deactivated successfully. Feb 9 10:08:04.222438 env[1146]: time="2024-02-09T10:08:04.222396728Z" level=info msg="StartContainer for \"3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5\" returns successfully" Feb 9 10:08:04.222000 audit: BPF prog-id=134 op=UNLOAD Feb 9 10:08:04.315007 env[1146]: time="2024-02-09T10:08:04.314897733Z" level=info msg="shim disconnected" id=3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5 Feb 9 10:08:04.315007 env[1146]: time="2024-02-09T10:08:04.314941818Z" level=warning msg="cleaning up after shim disconnected" id=3762a34f6372f975cc02e3d3e0d00d4e7a5145b045c6e72b857f91714ae66cb5 namespace=k8s.io Feb 9 10:08:04.315007 env[1146]: time="2024-02-09T10:08:04.314951700Z" level=info msg="cleaning up dead shim" Feb 9 10:08:04.322774 env[1146]: time="2024-02-09T10:08:04.322724918Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:08:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2566 runtime=io.containerd.runc.v2\n" Feb 9 10:08:04.795713 kubelet[2015]: E0209 10:08:04.795673 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:05.504940 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount151534374.mount: Deactivated successfully. Feb 9 10:08:05.730286 kubelet[2015]: E0209 10:08:05.729926 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:06.505792 env[1146]: time="2024-02-09T10:08:06.505676300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:06.506761 env[1146]: time="2024-02-09T10:08:06.506733857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:06.507380 env[1146]: time="2024-02-09T10:08:06.507350885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:06.508014 env[1146]: time="2024-02-09T10:08:06.507988876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:06.508987 env[1146]: time="2024-02-09T10:08:06.508928179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 10:08:06.509749 env[1146]: time="2024-02-09T10:08:06.509719467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 10:08:06.519176 env[1146]: time="2024-02-09T10:08:06.519126866Z" level=info msg="CreateContainer within sandbox \"b51b8ea85a09bf989274f67aceac93d247b0624e79947e762b249683607738d2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 10:08:06.529201 env[1146]: time="2024-02-09T10:08:06.529159214Z" level=info msg="CreateContainer within sandbox \"b51b8ea85a09bf989274f67aceac93d247b0624e79947e762b249683607738d2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"42ed8fd6300dcad52c34fb1f05dce9598075c5cb3333f160157f0e8befa2a607\"" Feb 9 10:08:06.530524 env[1146]: time="2024-02-09T10:08:06.530483080Z" level=info msg="StartContainer for \"42ed8fd6300dcad52c34fb1f05dce9598075c5cb3333f160157f0e8befa2a607\"" Feb 9 10:08:06.548061 systemd[1]: Started cri-containerd-42ed8fd6300dcad52c34fb1f05dce9598075c5cb3333f160157f0e8befa2a607.scope. Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.581000 audit: BPF prog-id=135 op=LOAD Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2442 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656438666436333030646361643532633334666231663035646365 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2442 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656438666436333030646361643532633334666231663035646365 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.582000 audit: BPF prog-id=136 op=LOAD Feb 9 10:08:06.582000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2442 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656438666436333030646361643532633334666231663035646365 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.583000 audit: BPF prog-id=137 op=LOAD Feb 9 10:08:06.583000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2442 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656438666436333030646361643532633334666231663035646365 Feb 9 10:08:06.584000 audit: BPF prog-id=137 op=UNLOAD Feb 9 10:08:06.584000 audit: BPF prog-id=136 op=UNLOAD Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:06.584000 audit: BPF prog-id=138 op=LOAD Feb 9 10:08:06.584000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2442 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656438666436333030646361643532633334666231663035646365 Feb 9 10:08:06.650274 env[1146]: time="2024-02-09T10:08:06.650214345Z" level=info msg="StartContainer for \"42ed8fd6300dcad52c34fb1f05dce9598075c5cb3333f160157f0e8befa2a607\" returns successfully" Feb 9 10:08:06.800171 kubelet[2015]: E0209 10:08:06.799781 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:06.808677 kubelet[2015]: I0209 10:08:06.808651 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7d75ccb77f-ffq9x" podStartSLOduration=1.127507495 podCreationTimestamp="2024-02-09 10:08:02 +0000 UTC" firstStartedPulling="2024-02-09 10:08:02.828220238 +0000 UTC m=+20.224516977" lastFinishedPulling="2024-02-09 10:08:06.509323023 +0000 UTC m=+23.905619762" observedRunningTime="2024-02-09 10:08:06.807822913 +0000 UTC m=+24.204119612" watchObservedRunningTime="2024-02-09 10:08:06.80861028 +0000 UTC m=+24.204906979" Feb 9 10:08:06.829000 audit[2625]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:06.829000 audit[2625]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffddb69200 a2=0 a3=ffffb8b3a6c0 items=0 ppid=2184 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:06.829000 audit[2625]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:06.829000 audit[2625]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffddb69200 a2=0 a3=ffffb8b3a6c0 items=0 ppid=2184 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:06.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:07.676798 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3048721695.mount: Deactivated successfully. Feb 9 10:08:07.730755 kubelet[2015]: E0209 10:08:07.730416 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:07.801300 kubelet[2015]: E0209 10:08:07.800867 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:08.803240 kubelet[2015]: E0209 10:08:08.803161 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:09.729959 kubelet[2015]: E0209 10:08:09.729925 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:09.919379 env[1146]: time="2024-02-09T10:08:09.919327707Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:09.920751 env[1146]: time="2024-02-09T10:08:09.920726963Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:09.922102 env[1146]: time="2024-02-09T10:08:09.922071254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:09.923297 env[1146]: time="2024-02-09T10:08:09.923272211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:09.923915 env[1146]: time="2024-02-09T10:08:09.923880270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 10:08:09.927839 env[1146]: time="2024-02-09T10:08:09.927806252Z" level=info msg="CreateContainer within sandbox \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 10:08:09.938393 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1582570556.mount: Deactivated successfully. Feb 9 10:08:09.941974 env[1146]: time="2024-02-09T10:08:09.941930588Z" level=info msg="CreateContainer within sandbox \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749\"" Feb 9 10:08:09.942530 env[1146]: time="2024-02-09T10:08:09.942495283Z" level=info msg="StartContainer for \"694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749\"" Feb 9 10:08:09.968470 systemd[1]: run-containerd-runc-k8s.io-694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749-runc.Ukzxak.mount: Deactivated successfully. Feb 9 10:08:09.969845 systemd[1]: Started cri-containerd-694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749.scope. Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027928 kernel: kauditd_printk_skb: 229 callbacks suppressed Feb 9 10:08:10.028019 kernel: audit: type=1400 audit(1707473290.025:1125): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.028049 kernel: audit: type=1300 audit(1707473290.025:1125): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2465 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:10.025000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2465 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:10.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346332663966373538643435336533333532663264383931393031 Feb 9 10:08:10.033218 kernel: audit: type=1327 audit(1707473290.025:1125): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346332663966373538643435336533333532663264383931393031 Feb 9 10:08:10.033286 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.036609 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.036669 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.038241 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.041636 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.041687 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.043317 kernel: audit: type=1400 audit(1707473290.025:1126): avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.025000 audit: BPF prog-id=139 op=LOAD Feb 9 10:08:10.025000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2465 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:10.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346332663966373538643435336533333532663264383931393031 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.026000 audit: BPF prog-id=140 op=LOAD Feb 9 10:08:10.026000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2465 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:10.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346332663966373538643435336533333532663264383931393031 Feb 9 10:08:10.027000 audit: BPF prog-id=140 op=UNLOAD Feb 9 10:08:10.027000 audit: BPF prog-id=139 op=UNLOAD Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:10.027000 audit: BPF prog-id=141 op=LOAD Feb 9 10:08:10.027000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2465 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:10.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346332663966373538643435336533333532663264383931393031 Feb 9 10:08:10.069468 env[1146]: time="2024-02-09T10:08:10.068811442Z" level=info msg="StartContainer for \"694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749\" returns successfully" Feb 9 10:08:10.675420 env[1146]: time="2024-02-09T10:08:10.675346729Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:08:10.677757 systemd[1]: cri-containerd-694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749.scope: Deactivated successfully. Feb 9 10:08:10.682000 audit: BPF prog-id=141 op=UNLOAD Feb 9 10:08:10.748377 env[1146]: time="2024-02-09T10:08:10.748280671Z" level=info msg="shim disconnected" id=694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749 Feb 9 10:08:10.748377 env[1146]: time="2024-02-09T10:08:10.748345277Z" level=warning msg="cleaning up after shim disconnected" id=694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749 namespace=k8s.io Feb 9 10:08:10.748377 env[1146]: time="2024-02-09T10:08:10.748354597Z" level=info msg="cleaning up dead shim" Feb 9 10:08:10.751127 kubelet[2015]: I0209 10:08:10.750262 2015 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 10:08:10.763914 env[1146]: time="2024-02-09T10:08:10.763811363Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:08:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2682 runtime=io.containerd.runc.v2\n" Feb 9 10:08:10.770626 kubelet[2015]: I0209 10:08:10.769988 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:08:10.771822 kubelet[2015]: I0209 10:08:10.771521 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:08:10.772229 kubelet[2015]: I0209 10:08:10.772201 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:08:10.775602 systemd[1]: Created slice kubepods-burstable-pod765577a7_f1c7_408d_8c19_952f58f5fd64.slice. Feb 9 10:08:10.779141 systemd[1]: Created slice kubepods-besteffort-pod8a114f4e_6fa9_41cd_8fc6_a35a024358f2.slice. Feb 9 10:08:10.783765 systemd[1]: Created slice kubepods-burstable-pod133f29c4_2add_444f_8ba7_b32a8c0bef25.slice. Feb 9 10:08:10.807688 kubelet[2015]: E0209 10:08:10.807656 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:10.808367 env[1146]: time="2024-02-09T10:08:10.808329927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 10:08:10.900357 kubelet[2015]: I0209 10:08:10.900318 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qp4zc\" (UniqueName: \"kubernetes.io/projected/8a114f4e-6fa9-41cd-8fc6-a35a024358f2-kube-api-access-qp4zc\") pod \"calico-kube-controllers-68759dd98f-h726l\" (UID: \"8a114f4e-6fa9-41cd-8fc6-a35a024358f2\") " pod="calico-system/calico-kube-controllers-68759dd98f-h726l" Feb 9 10:08:10.900641 kubelet[2015]: I0209 10:08:10.900625 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pf74r\" (UniqueName: \"kubernetes.io/projected/765577a7-f1c7-408d-8c19-952f58f5fd64-kube-api-access-pf74r\") pod \"coredns-5d78c9869d-7f5h4\" (UID: \"765577a7-f1c7-408d-8c19-952f58f5fd64\") " pod="kube-system/coredns-5d78c9869d-7f5h4" Feb 9 10:08:10.900821 kubelet[2015]: I0209 10:08:10.900792 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/133f29c4-2add-444f-8ba7-b32a8c0bef25-config-volume\") pod \"coredns-5d78c9869d-8xv4b\" (UID: \"133f29c4-2add-444f-8ba7-b32a8c0bef25\") " pod="kube-system/coredns-5d78c9869d-8xv4b" Feb 9 10:08:10.900994 kubelet[2015]: I0209 10:08:10.900981 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/765577a7-f1c7-408d-8c19-952f58f5fd64-config-volume\") pod \"coredns-5d78c9869d-7f5h4\" (UID: \"765577a7-f1c7-408d-8c19-952f58f5fd64\") " pod="kube-system/coredns-5d78c9869d-7f5h4" Feb 9 10:08:10.901101 kubelet[2015]: I0209 10:08:10.901091 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8a114f4e-6fa9-41cd-8fc6-a35a024358f2-tigera-ca-bundle\") pod \"calico-kube-controllers-68759dd98f-h726l\" (UID: \"8a114f4e-6fa9-41cd-8fc6-a35a024358f2\") " pod="calico-system/calico-kube-controllers-68759dd98f-h726l" Feb 9 10:08:10.901250 kubelet[2015]: I0209 10:08:10.901226 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dp99r\" (UniqueName: \"kubernetes.io/projected/133f29c4-2add-444f-8ba7-b32a8c0bef25-kube-api-access-dp99r\") pod \"coredns-5d78c9869d-8xv4b\" (UID: \"133f29c4-2add-444f-8ba7-b32a8c0bef25\") " pod="kube-system/coredns-5d78c9869d-8xv4b" Feb 9 10:08:10.936425 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-694c2f9f758d453e3352f2d8919015981a8609a0afc243d2d9ab629aa44df749-rootfs.mount: Deactivated successfully. Feb 9 10:08:11.078003 kubelet[2015]: E0209 10:08:11.077957 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:11.078663 env[1146]: time="2024-02-09T10:08:11.078618166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-7f5h4,Uid:765577a7-f1c7-408d-8c19-952f58f5fd64,Namespace:kube-system,Attempt:0,}" Feb 9 10:08:11.082698 env[1146]: time="2024-02-09T10:08:11.082658489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68759dd98f-h726l,Uid:8a114f4e-6fa9-41cd-8fc6-a35a024358f2,Namespace:calico-system,Attempt:0,}" Feb 9 10:08:11.087151 kubelet[2015]: E0209 10:08:11.087129 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:11.087815 env[1146]: time="2024-02-09T10:08:11.087634897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8xv4b,Uid:133f29c4-2add-444f-8ba7-b32a8c0bef25,Namespace:kube-system,Attempt:0,}" Feb 9 10:08:11.195943 env[1146]: time="2024-02-09T10:08:11.195468755Z" level=error msg="Failed to destroy network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.195943 env[1146]: time="2024-02-09T10:08:11.195856670Z" level=error msg="encountered an error cleaning up failed sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.196135 env[1146]: time="2024-02-09T10:08:11.196001603Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68759dd98f-h726l,Uid:8a114f4e-6fa9-41cd-8fc6-a35a024358f2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.196844 kubelet[2015]: E0209 10:08:11.196706 2015 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.197066 kubelet[2015]: E0209 10:08:11.196981 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68759dd98f-h726l" Feb 9 10:08:11.197544 kubelet[2015]: E0209 10:08:11.197225 2015 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68759dd98f-h726l" Feb 9 10:08:11.197544 kubelet[2015]: E0209 10:08:11.197309 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-68759dd98f-h726l_calico-system(8a114f4e-6fa9-41cd-8fc6-a35a024358f2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-68759dd98f-h726l_calico-system(8a114f4e-6fa9-41cd-8fc6-a35a024358f2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68759dd98f-h726l" podUID=8a114f4e-6fa9-41cd-8fc6-a35a024358f2 Feb 9 10:08:11.202311 env[1146]: time="2024-02-09T10:08:11.202264846Z" level=error msg="Failed to destroy network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.202649 env[1146]: time="2024-02-09T10:08:11.202619478Z" level=error msg="encountered an error cleaning up failed sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.202699 env[1146]: time="2024-02-09T10:08:11.202674883Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-7f5h4,Uid:765577a7-f1c7-408d-8c19-952f58f5fd64,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.203281 kubelet[2015]: E0209 10:08:11.202884 2015 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.203281 kubelet[2015]: E0209 10:08:11.202941 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-7f5h4" Feb 9 10:08:11.203281 kubelet[2015]: E0209 10:08:11.202959 2015 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-7f5h4" Feb 9 10:08:11.203480 kubelet[2015]: E0209 10:08:11.203257 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-7f5h4_kube-system(765577a7-f1c7-408d-8c19-952f58f5fd64)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-7f5h4_kube-system(765577a7-f1c7-408d-8c19-952f58f5fd64)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-7f5h4" podUID=765577a7-f1c7-408d-8c19-952f58f5fd64 Feb 9 10:08:11.206490 env[1146]: time="2024-02-09T10:08:11.206447423Z" level=error msg="Failed to destroy network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.206793 env[1146]: time="2024-02-09T10:08:11.206751610Z" level=error msg="encountered an error cleaning up failed sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.206835 env[1146]: time="2024-02-09T10:08:11.206806455Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8xv4b,Uid:133f29c4-2add-444f-8ba7-b32a8c0bef25,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.207015 kubelet[2015]: E0209 10:08:11.206985 2015 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.207086 kubelet[2015]: E0209 10:08:11.207030 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8xv4b" Feb 9 10:08:11.207086 kubelet[2015]: E0209 10:08:11.207049 2015 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8xv4b" Feb 9 10:08:11.207143 kubelet[2015]: E0209 10:08:11.207097 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-8xv4b_kube-system(133f29c4-2add-444f-8ba7-b32a8c0bef25)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-8xv4b_kube-system(133f29c4-2add-444f-8ba7-b32a8c0bef25)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8xv4b" podUID=133f29c4-2add-444f-8ba7-b32a8c0bef25 Feb 9 10:08:11.734383 systemd[1]: Created slice kubepods-besteffort-pod4456e44a_abbe_4da2_85d0_ed59b572ad98.slice. Feb 9 10:08:11.736557 env[1146]: time="2024-02-09T10:08:11.736520135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p9jm6,Uid:4456e44a-abbe-4da2-85d0-ed59b572ad98,Namespace:calico-system,Attempt:0,}" Feb 9 10:08:11.785404 env[1146]: time="2024-02-09T10:08:11.785341846Z" level=error msg="Failed to destroy network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.785699 env[1146]: time="2024-02-09T10:08:11.785661515Z" level=error msg="encountered an error cleaning up failed sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.785747 env[1146]: time="2024-02-09T10:08:11.785708159Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p9jm6,Uid:4456e44a-abbe-4da2-85d0-ed59b572ad98,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.785995 kubelet[2015]: E0209 10:08:11.785958 2015 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.786237 kubelet[2015]: E0209 10:08:11.786023 2015 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:11.786237 kubelet[2015]: E0209 10:08:11.786052 2015 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p9jm6" Feb 9 10:08:11.786237 kubelet[2015]: E0209 10:08:11.786102 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-p9jm6_calico-system(4456e44a-abbe-4da2-85d0-ed59b572ad98)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-p9jm6_calico-system(4456e44a-abbe-4da2-85d0-ed59b572ad98)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:11.809118 kubelet[2015]: I0209 10:08:11.809076 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:11.809706 env[1146]: time="2024-02-09T10:08:11.809636671Z" level=info msg="StopPodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\"" Feb 9 10:08:11.810759 kubelet[2015]: I0209 10:08:11.810732 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:11.811275 env[1146]: time="2024-02-09T10:08:11.811237895Z" level=info msg="StopPodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\"" Feb 9 10:08:11.814087 kubelet[2015]: I0209 10:08:11.814066 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:11.815610 env[1146]: time="2024-02-09T10:08:11.815547442Z" level=info msg="StopPodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\"" Feb 9 10:08:11.817024 kubelet[2015]: I0209 10:08:11.817000 2015 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:11.817644 env[1146]: time="2024-02-09T10:08:11.817609348Z" level=info msg="StopPodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\"" Feb 9 10:08:11.837851 env[1146]: time="2024-02-09T10:08:11.837762960Z" level=error msg="StopPodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" failed" error="failed to destroy network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.838304 kubelet[2015]: E0209 10:08:11.838276 2015 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:11.838372 kubelet[2015]: E0209 10:08:11.838345 2015 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4} Feb 9 10:08:11.838446 kubelet[2015]: E0209 10:08:11.838380 2015 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4456e44a-abbe-4da2-85d0-ed59b572ad98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:08:11.838446 kubelet[2015]: E0209 10:08:11.838429 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4456e44a-abbe-4da2-85d0-ed59b572ad98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p9jm6" podUID=4456e44a-abbe-4da2-85d0-ed59b572ad98 Feb 9 10:08:11.846850 env[1146]: time="2024-02-09T10:08:11.846791892Z" level=error msg="StopPodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" failed" error="failed to destroy network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.847238 kubelet[2015]: E0209 10:08:11.847205 2015 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:11.847328 kubelet[2015]: E0209 10:08:11.847261 2015 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3} Feb 9 10:08:11.847364 kubelet[2015]: E0209 10:08:11.847331 2015 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"133f29c4-2add-444f-8ba7-b32a8c0bef25\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:08:11.847364 kubelet[2015]: E0209 10:08:11.847361 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"133f29c4-2add-444f-8ba7-b32a8c0bef25\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8xv4b" podUID=133f29c4-2add-444f-8ba7-b32a8c0bef25 Feb 9 10:08:11.847450 env[1146]: time="2024-02-09T10:08:11.847022513Z" level=error msg="StopPodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" failed" error="failed to destroy network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.847532 kubelet[2015]: E0209 10:08:11.847517 2015 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:11.847573 kubelet[2015]: E0209 10:08:11.847538 2015 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5} Feb 9 10:08:11.847573 kubelet[2015]: E0209 10:08:11.847571 2015 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8a114f4e-6fa9-41cd-8fc6-a35a024358f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:08:11.847642 kubelet[2015]: E0209 10:08:11.847592 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8a114f4e-6fa9-41cd-8fc6-a35a024358f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68759dd98f-h726l" podUID=8a114f4e-6fa9-41cd-8fc6-a35a024358f2 Feb 9 10:08:11.858272 env[1146]: time="2024-02-09T10:08:11.858218720Z" level=error msg="StopPodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" failed" error="failed to destroy network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:08:11.858556 kubelet[2015]: E0209 10:08:11.858536 2015 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:11.858618 kubelet[2015]: E0209 10:08:11.858571 2015 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd} Feb 9 10:08:11.858618 kubelet[2015]: E0209 10:08:11.858599 2015 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"765577a7-f1c7-408d-8c19-952f58f5fd64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:08:11.858688 kubelet[2015]: E0209 10:08:11.858626 2015 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"765577a7-f1c7-408d-8c19-952f58f5fd64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-7f5h4" podUID=765577a7-f1c7-408d-8c19-952f58f5fd64 Feb 9 10:08:11.937482 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd-shm.mount: Deactivated successfully. Feb 9 10:08:12.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.126:22-10.0.0.1:40246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:12.696111 systemd[1]: Started sshd@7-10.0.0.126:22-10.0.0.1:40246.service. Feb 9 10:08:12.747981 sshd[2948]: Accepted publickey for core from 10.0.0.1 port 40246 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:12.747000 audit[2948]: USER_ACCT pid=2948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:12.748000 audit[2948]: CRED_ACQ pid=2948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:12.748000 audit[2948]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffcb6d10 a2=3 a3=1 items=0 ppid=1 pid=2948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:12.748000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:12.749534 sshd[2948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:12.753462 systemd-logind[1132]: New session 8 of user core. Feb 9 10:08:12.753934 systemd[1]: Started session-8.scope. Feb 9 10:08:12.757000 audit[2948]: USER_START pid=2948 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:12.758000 audit[2950]: CRED_ACQ pid=2950 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:12.993444 sshd[2948]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:12.993000 audit[2948]: USER_END pid=2948 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:12.993000 audit[2948]: CRED_DISP pid=2948 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:12.995988 systemd[1]: sshd@7-10.0.0.126:22-10.0.0.1:40246.service: Deactivated successfully. Feb 9 10:08:12.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.126:22-10.0.0.1:40246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:12.996807 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 10:08:12.997370 systemd-logind[1132]: Session 8 logged out. Waiting for processes to exit. Feb 9 10:08:12.998137 systemd-logind[1132]: Removed session 8. Feb 9 10:08:16.031679 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2367759136.mount: Deactivated successfully. Feb 9 10:08:16.413988 env[1146]: time="2024-02-09T10:08:16.413879994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:16.415464 env[1146]: time="2024-02-09T10:08:16.415431111Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:16.416964 env[1146]: time="2024-02-09T10:08:16.416923703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:16.418490 env[1146]: time="2024-02-09T10:08:16.418463818Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:16.418817 env[1146]: time="2024-02-09T10:08:16.418779842Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 10:08:16.429544 env[1146]: time="2024-02-09T10:08:16.429504967Z" level=info msg="CreateContainer within sandbox \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 10:08:16.440690 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1464316811.mount: Deactivated successfully. Feb 9 10:08:16.442693 env[1146]: time="2024-02-09T10:08:16.442661155Z" level=info msg="CreateContainer within sandbox \"b41c5e5cb223d3a0e1a52015dd7b18f9950d4d8b13059c0ce08ee743ee214dee\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fe01d669a1aa0f151a868ee1e3d5587e437307c9a9fad775d2b0bad033a0249d\"" Feb 9 10:08:16.444277 env[1146]: time="2024-02-09T10:08:16.443228958Z" level=info msg="StartContainer for \"fe01d669a1aa0f151a868ee1e3d5587e437307c9a9fad775d2b0bad033a0249d\"" Feb 9 10:08:16.460365 systemd[1]: Started cri-containerd-fe01d669a1aa0f151a868ee1e3d5587e437307c9a9fad775d2b0bad033a0249d.scope. Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.529658 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 9 10:08:16.529737 kernel: audit: type=1400 audit(1707473296.525:1141): avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.529763 kernel: audit: type=1300 audit(1707473296.525:1141): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2465 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:16.525000 audit[2971]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2465 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:16.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665303164363639613161613066313531613836386565316533643535 Feb 9 10:08:16.535199 kernel: audit: type=1327 audit(1707473296.525:1141): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665303164363639613161613066313531613836386565316533643535 Feb 9 10:08:16.535312 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.538545 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.538611 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.541901 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.541957 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.543580 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.545240 kernel: audit: type=1400 audit(1707473296.525:1142): avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit: BPF prog-id=142 op=LOAD Feb 9 10:08:16.525000 audit[2971]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2465 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:16.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665303164363639613161613066313531613836386565316533643535 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit: BPF prog-id=143 op=LOAD Feb 9 10:08:16.525000 audit[2971]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2465 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:16.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665303164363639613161613066313531613836386565316533643535 Feb 9 10:08:16.525000 audit: BPF prog-id=143 op=UNLOAD Feb 9 10:08:16.525000 audit: BPF prog-id=142 op=UNLOAD Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:16.525000 audit: BPF prog-id=144 op=LOAD Feb 9 10:08:16.525000 audit[2971]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2465 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:16.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665303164363639613161613066313531613836386565316533643535 Feb 9 10:08:16.572027 env[1146]: time="2024-02-09T10:08:16.570290777Z" level=info msg="StartContainer for \"fe01d669a1aa0f151a868ee1e3d5587e437307c9a9fad775d2b0bad033a0249d\" returns successfully" Feb 9 10:08:16.670741 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 10:08:16.670855 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 10:08:16.830868 kubelet[2015]: E0209 10:08:16.830832 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:17.831731 kubelet[2015]: I0209 10:08:17.831675 2015 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:08:17.832750 kubelet[2015]: E0209 10:08:17.832448 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:17.935000 audit[3077]: AVC avc: denied { write } for pid=3077 comm="tee" name="fd" dev="proc" ino=19500 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.935000 audit[3077]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5d3f994 a2=241 a3=1b6 items=1 ppid=3041 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.935000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 10:08:17.935000 audit: PATH item=0 name="/dev/fd/63" inode=18726 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.935000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.953000 audit[3096]: AVC avc: denied { write } for pid=3096 comm="tee" name="fd" dev="proc" ino=18211 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.953000 audit[3096]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe569d995 a2=241 a3=1b6 items=1 ppid=3047 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.953000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 10:08:17.953000 audit: PATH item=0 name="/dev/fd/63" inode=19502 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.953000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.956000 audit[3108]: AVC avc: denied { write } for pid=3108 comm="tee" name="fd" dev="proc" ino=18745 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.956000 audit[3108]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce061993 a2=241 a3=1b6 items=1 ppid=3045 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.956000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 10:08:17.956000 audit: PATH item=0 name="/dev/fd/63" inode=17296 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.956000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.962000 audit[3104]: AVC avc: denied { write } for pid=3104 comm="tee" name="fd" dev="proc" ino=18749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.962000 audit[3104]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc04b6984 a2=241 a3=1b6 items=1 ppid=3051 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.962000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 10:08:17.962000 audit: PATH item=0 name="/dev/fd/63" inode=18738 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.962000 audit[3113]: AVC avc: denied { write } for pid=3113 comm="tee" name="fd" dev="proc" ino=18751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.962000 audit[3113]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9393993 a2=241 a3=1b6 items=1 ppid=3053 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.962000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 10:08:17.962000 audit: PATH item=0 name="/dev/fd/63" inode=19506 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.975000 audit[3100]: AVC avc: denied { write } for pid=3100 comm="tee" name="fd" dev="proc" ino=19513 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.976000 audit[3085]: AVC avc: denied { write } for pid=3085 comm="tee" name="fd" dev="proc" ino=19515 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:08:17.976000 audit[3085]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdfbdd993 a2=241 a3=1b6 items=1 ppid=3040 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.976000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 10:08:17.976000 audit: PATH item=0 name="/dev/fd/63" inode=18204 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.976000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.975000 audit[3100]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffee78983 a2=241 a3=1b6 items=1 ppid=3039 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:17.975000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 10:08:17.975000 audit: PATH item=0 name="/dev/fd/63" inode=17292 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:08:17.975000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:08:17.996238 systemd[1]: Started sshd@8-10.0.0.126:22-10.0.0.1:40254.service. Feb 9 10:08:17.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.126:22-10.0.0.1:40254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:18.051000 audit[3124]: USER_ACCT pid=3124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:18.053065 sshd[3124]: Accepted publickey for core from 10.0.0.1 port 40254 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:18.052000 audit[3124]: CRED_ACQ pid=3124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:18.053000 audit[3124]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf23baa0 a2=3 a3=1 items=0 ppid=1 pid=3124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:18.054999 sshd[3124]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:18.059911 systemd-logind[1132]: New session 9 of user core. Feb 9 10:08:18.060782 systemd[1]: Started session-9.scope. Feb 9 10:08:18.065000 audit[3124]: USER_START pid=3124 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:18.067000 audit[3141]: CRED_ACQ pid=3141 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit: BPF prog-id=145 op=LOAD Feb 9 10:08:18.215000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd08b5bb8 a2=70 a3=0 items=0 ppid=3042 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.215000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:08:18.215000 audit: BPF prog-id=145 op=UNLOAD Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.215000 audit: BPF prog-id=146 op=LOAD Feb 9 10:08:18.215000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd08b5bb8 a2=70 a3=4a174c items=0 ppid=3042 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.215000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:08:18.215000 audit: BPF prog-id=146 op=UNLOAD Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd08b5be8 a2=70 a3=1457a79f items=0 ppid=3042 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.216000 audit: BPF prog-id=147 op=LOAD Feb 9 10:08:18.216000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd08b5b38 a2=70 a3=1457a7b9 items=0 ppid=3042 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:08:18.229000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.229000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffd72d4e8 a2=70 a3=0 items=0 ppid=3042 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:08:18.229000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:18.229000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffd72d3c8 a2=70 a3=2 items=0 ppid=3042 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:08:18.231721 sshd[3124]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:18.235000 audit[3124]: USER_END pid=3124 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:18.235000 audit[3124]: CRED_DISP pid=3124 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:18.238479 systemd[1]: sshd@8-10.0.0.126:22-10.0.0.1:40254.service: Deactivated successfully. Feb 9 10:08:18.239345 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 10:08:18.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.126:22-10.0.0.1:40254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:18.238000 audit: BPF prog-id=147 op=UNLOAD Feb 9 10:08:18.239895 systemd-logind[1132]: Session 9 logged out. Waiting for processes to exit. Feb 9 10:08:18.240924 systemd-logind[1132]: Removed session 9. Feb 9 10:08:18.281000 audit[3235]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3235 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:18.281000 audit[3235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc4900ce0 a2=0 a3=ffff8e617fa8 items=0 ppid=3042 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.281000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:18.284000 audit[3234]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:18.284000 audit[3234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffffa1d7480 a2=0 a3=ffffb4230fa8 items=0 ppid=3042 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:18.285000 audit[3237]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:18.285000 audit[3237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffd69599f0 a2=0 a3=ffffa457efa8 items=0 ppid=3042 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.285000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:18.286000 audit[3239]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:18.286000 audit[3239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff5001e30 a2=0 a3=ffff819cbfa8 items=0 ppid=3042 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:18.286000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:19.071867 systemd-networkd[1047]: vxlan.calico: Link UP Feb 9 10:08:19.071874 systemd-networkd[1047]: vxlan.calico: Gained carrier Feb 9 10:08:20.281209 kubelet[2015]: I0209 10:08:20.281165 2015 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:08:20.282029 kubelet[2015]: E0209 10:08:20.282012 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:20.371042 systemd[1]: run-containerd-runc-k8s.io-fe01d669a1aa0f151a868ee1e3d5587e437307c9a9fad775d2b0bad033a0249d-runc.nhNZKF.mount: Deactivated successfully. Feb 9 10:08:20.373595 kubelet[2015]: I0209 10:08:20.373556 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-cp64c" podStartSLOduration=4.769963753 podCreationTimestamp="2024-02-09 10:08:02 +0000 UTC" firstStartedPulling="2024-02-09 10:08:02.815456309 +0000 UTC m=+20.211753048" lastFinishedPulling="2024-02-09 10:08:16.419011419 +0000 UTC m=+33.815308158" observedRunningTime="2024-02-09 10:08:16.8484401 +0000 UTC m=+34.244736839" watchObservedRunningTime="2024-02-09 10:08:20.373518863 +0000 UTC m=+37.769815602" Feb 9 10:08:20.550498 systemd-networkd[1047]: vxlan.calico: Gained IPv6LL Feb 9 10:08:20.836804 kubelet[2015]: E0209 10:08:20.836700 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:22.732994 env[1146]: time="2024-02-09T10:08:22.732949828Z" level=info msg="StopPodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\"" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.799 [INFO][3312] k8s.go 578: Cleaning up netns ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.800 [INFO][3312] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" iface="eth0" netns="/var/run/netns/cni-8a9e6ecb-d701-9eae-6583-86927419aee8" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.800 [INFO][3312] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" iface="eth0" netns="/var/run/netns/cni-8a9e6ecb-d701-9eae-6583-86927419aee8" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.800 [INFO][3312] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" iface="eth0" netns="/var/run/netns/cni-8a9e6ecb-d701-9eae-6583-86927419aee8" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.801 [INFO][3312] k8s.go 585: Releasing IP address(es) ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.801 [INFO][3312] utils.go 188: Calico CNI releasing IP address ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.886 [INFO][3320] ipam_plugin.go 415: Releasing address using handleID ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.886 [INFO][3320] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.886 [INFO][3320] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.897 [WARNING][3320] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.897 [INFO][3320] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.898 [INFO][3320] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:22.901401 env[1146]: 2024-02-09 10:08:22.900 [INFO][3312] k8s.go 591: Teardown processing complete. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:22.903787 env[1146]: time="2024-02-09T10:08:22.901564375Z" level=info msg="TearDown network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" successfully" Feb 9 10:08:22.903787 env[1146]: time="2024-02-09T10:08:22.901596617Z" level=info msg="StopPodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" returns successfully" Feb 9 10:08:22.903162 systemd[1]: run-netns-cni\x2d8a9e6ecb\x2dd701\x2d9eae\x2d6583\x2d86927419aee8.mount: Deactivated successfully. Feb 9 10:08:22.904037 env[1146]: time="2024-02-09T10:08:22.903925843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p9jm6,Uid:4456e44a-abbe-4da2-85d0-ed59b572ad98,Namespace:calico-system,Attempt:1,}" Feb 9 10:08:23.025094 systemd-networkd[1047]: cali22d455643b8: Link UP Feb 9 10:08:23.027635 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:08:23.027764 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali22d455643b8: link becomes ready Feb 9 10:08:23.027438 systemd-networkd[1047]: cali22d455643b8: Gained carrier Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.952 [INFO][3328] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--p9jm6-eth0 csi-node-driver- calico-system 4456e44a-abbe-4da2-85d0-ed59b572ad98 805 0 2024-02-09 10:08:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-p9jm6 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali22d455643b8 [] []}} ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.952 [INFO][3328] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.977 [INFO][3341] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" HandleID="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.991 [INFO][3341] ipam_plugin.go 268: Auto assigning IP ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" HandleID="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cdb30), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-p9jm6", "timestamp":"2024-02-09 10:08:22.977775022 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.991 [INFO][3341] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.991 [INFO][3341] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.991 [INFO][3341] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.993 [INFO][3341] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:22.998 [INFO][3341] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.002 [INFO][3341] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.007 [INFO][3341] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.009 [INFO][3341] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.009 [INFO][3341] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.011 [INFO][3341] ipam.go 1682: Creating new handle: k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4 Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.015 [INFO][3341] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.020 [INFO][3341] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.020 [INFO][3341] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" host="localhost" Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.020 [INFO][3341] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:23.040539 env[1146]: 2024-02-09 10:08:23.020 [INFO][3341] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" HandleID="k8s-pod-network.3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.041176 env[1146]: 2024-02-09 10:08:23.022 [INFO][3328] k8s.go 385: Populated endpoint ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p9jm6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4456e44a-abbe-4da2-85d0-ed59b572ad98", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-p9jm6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali22d455643b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:23.041176 env[1146]: 2024-02-09 10:08:23.022 [INFO][3328] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.041176 env[1146]: 2024-02-09 10:08:23.022 [INFO][3328] dataplane_linux.go 68: Setting the host side veth name to cali22d455643b8 ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.041176 env[1146]: 2024-02-09 10:08:23.025 [INFO][3328] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.041176 env[1146]: 2024-02-09 10:08:23.025 [INFO][3328] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p9jm6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4456e44a-abbe-4da2-85d0-ed59b572ad98", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4", Pod:"csi-node-driver-p9jm6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali22d455643b8", MAC:"be:bc:56:7d:9a:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:23.041176 env[1146]: 2024-02-09 10:08:23.038 [INFO][3328] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4" Namespace="calico-system" Pod="csi-node-driver-p9jm6" WorkloadEndpoint="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:23.050000 audit[3366]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:23.052437 kernel: kauditd_printk_skb: 140 callbacks suppressed Feb 9 10:08:23.052479 kernel: audit: type=1325 audit(1707473303.050:1176): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:23.050000 audit[3366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc0804b10 a2=0 a3=ffffa902efa8 items=0 ppid=3042 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.056555 kernel: audit: type=1300 audit(1707473303.050:1176): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffc0804b10 a2=0 a3=ffffa902efa8 items=0 ppid=3042 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.056609 kernel: audit: type=1327 audit(1707473303.050:1176): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:23.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:23.060568 env[1146]: time="2024-02-09T10:08:23.060505539Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:08:23.060676 env[1146]: time="2024-02-09T10:08:23.060581424Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:08:23.060676 env[1146]: time="2024-02-09T10:08:23.060607705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:08:23.060808 env[1146]: time="2024-02-09T10:08:23.060762315Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4 pid=3375 runtime=io.containerd.runc.v2 Feb 9 10:08:23.070378 systemd[1]: Started cri-containerd-3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4.scope. Feb 9 10:08:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.098840 kernel: audit: type=1400 audit(1707473303.093:1177): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.098891 kernel: audit: type=1400 audit(1707473303.093:1178): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.098923 kernel: audit: type=1400 audit(1707473303.094:1179): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.100615 kernel: audit: type=1400 audit(1707473303.094:1180): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.102372 kernel: audit: type=1400 audit(1707473303.094:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.104330 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:08:23.105899 kernel: audit: type=1400 audit(1707473303.094:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.105944 kernel: audit: type=1400 audit(1707473303.094:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.095000 audit: BPF prog-id=148 op=LOAD Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3375 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663534663762373963633738343266656132336535653364646333 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3375 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663534663762373963633738343266656132336535653364646333 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.096000 audit: BPF prog-id=149 op=LOAD Feb 9 10:08:23.096000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3375 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663534663762373963633738343266656132336535653364646333 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.097000 audit: BPF prog-id=150 op=LOAD Feb 9 10:08:23.097000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3375 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663534663762373963633738343266656132336535653364646333 Feb 9 10:08:23.099000 audit: BPF prog-id=150 op=UNLOAD Feb 9 10:08:23.099000 audit: BPF prog-id=149 op=UNLOAD Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:23.099000 audit: BPF prog-id=151 op=LOAD Feb 9 10:08:23.099000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3375 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663534663762373963633738343266656132336535653364646333 Feb 9 10:08:23.119834 env[1146]: time="2024-02-09T10:08:23.119786869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p9jm6,Uid:4456e44a-abbe-4da2-85d0-ed59b572ad98,Namespace:calico-system,Attempt:1,} returns sandbox id \"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4\"" Feb 9 10:08:23.120971 env[1146]: time="2024-02-09T10:08:23.120946020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:08:23.236296 systemd[1]: Started sshd@9-10.0.0.126:22-10.0.0.1:47214.service. Feb 9 10:08:23.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.126:22-10.0.0.1:47214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:23.277000 audit[3409]: USER_ACCT pid=3409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.278571 sshd[3409]: Accepted publickey for core from 10.0.0.1 port 47214 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:23.279000 audit[3409]: CRED_ACQ pid=3409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.279000 audit[3409]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8c01c60 a2=3 a3=1 items=0 ppid=1 pid=3409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.279000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:23.280406 sshd[3409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:23.283719 systemd-logind[1132]: New session 10 of user core. Feb 9 10:08:23.284541 systemd[1]: Started session-10.scope. Feb 9 10:08:23.290000 audit[3409]: USER_START pid=3409 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.291000 audit[3413]: CRED_ACQ pid=3413 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.404052 sshd[3409]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:23.404000 audit[3409]: USER_END pid=3409 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.404000 audit[3409]: CRED_DISP pid=3409 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.126:22-10.0.0.1:47228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:23.406982 systemd[1]: Started sshd@10-10.0.0.126:22-10.0.0.1:47228.service. Feb 9 10:08:23.407477 systemd[1]: sshd@9-10.0.0.126:22-10.0.0.1:47214.service: Deactivated successfully. Feb 9 10:08:23.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.126:22-10.0.0.1:47214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:23.408296 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 10:08:23.408828 systemd-logind[1132]: Session 10 logged out. Waiting for processes to exit. Feb 9 10:08:23.409603 systemd-logind[1132]: Removed session 10. Feb 9 10:08:23.444000 audit[3428]: USER_ACCT pid=3428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.444750 sshd[3428]: Accepted publickey for core from 10.0.0.1 port 47228 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:23.445000 audit[3428]: CRED_ACQ pid=3428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.445000 audit[3428]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe2741800 a2=3 a3=1 items=0 ppid=1 pid=3428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:23.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:23.446313 sshd[3428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:23.449358 systemd-logind[1132]: New session 11 of user core. Feb 9 10:08:23.450337 systemd[1]: Started session-11.scope. Feb 9 10:08:23.453000 audit[3428]: USER_START pid=3428 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.454000 audit[3431]: CRED_ACQ pid=3431 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:23.731233 env[1146]: time="2024-02-09T10:08:23.731178061Z" level=info msg="StopPodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\"" Feb 9 10:08:23.731622 env[1146]: time="2024-02-09T10:08:23.731580605Z" level=info msg="StopPodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\"" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.774 [INFO][3473] k8s.go 578: Cleaning up netns ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.774 [INFO][3473] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" iface="eth0" netns="/var/run/netns/cni-a1235e7e-4def-e8f4-7969-d32c7674c7a9" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.774 [INFO][3473] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" iface="eth0" netns="/var/run/netns/cni-a1235e7e-4def-e8f4-7969-d32c7674c7a9" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.774 [INFO][3473] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" iface="eth0" netns="/var/run/netns/cni-a1235e7e-4def-e8f4-7969-d32c7674c7a9" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.774 [INFO][3473] k8s.go 585: Releasing IP address(es) ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.774 [INFO][3473] utils.go 188: Calico CNI releasing IP address ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.796 [INFO][3489] ipam_plugin.go 415: Releasing address using handleID ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.796 [INFO][3489] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.796 [INFO][3489] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.810 [WARNING][3489] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.810 [INFO][3489] ipam_plugin.go 443: Releasing address using workloadID ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.812 [INFO][3489] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:23.815331 env[1146]: 2024-02-09 10:08:23.813 [INFO][3473] k8s.go 591: Teardown processing complete. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:23.815960 env[1146]: time="2024-02-09T10:08:23.815448072Z" level=info msg="TearDown network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" successfully" Feb 9 10:08:23.815960 env[1146]: time="2024-02-09T10:08:23.815480514Z" level=info msg="StopPodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" returns successfully" Feb 9 10:08:23.816009 kubelet[2015]: E0209 10:08:23.815789 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:23.816546 env[1146]: time="2024-02-09T10:08:23.816489896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-7f5h4,Uid:765577a7-f1c7-408d-8c19-952f58f5fd64,Namespace:kube-system,Attempt:1,}" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.778 [INFO][3474] k8s.go 578: Cleaning up netns ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.778 [INFO][3474] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" iface="eth0" netns="/var/run/netns/cni-41804d57-8056-0d61-43ab-6c8742ee5dd8" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.778 [INFO][3474] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" iface="eth0" netns="/var/run/netns/cni-41804d57-8056-0d61-43ab-6c8742ee5dd8" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.778 [INFO][3474] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" iface="eth0" netns="/var/run/netns/cni-41804d57-8056-0d61-43ab-6c8742ee5dd8" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.778 [INFO][3474] k8s.go 585: Releasing IP address(es) ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.778 [INFO][3474] utils.go 188: Calico CNI releasing IP address ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.803 [INFO][3494] ipam_plugin.go 415: Releasing address using handleID ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.803 [INFO][3494] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.812 [INFO][3494] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.822 [WARNING][3494] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.822 [INFO][3494] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.824 [INFO][3494] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:23.827550 env[1146]: 2024-02-09 10:08:23.825 [INFO][3474] k8s.go 591: Teardown processing complete. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:23.828108 env[1146]: time="2024-02-09T10:08:23.828082602Z" level=info msg="TearDown network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" successfully" Feb 9 10:08:23.828207 env[1146]: time="2024-02-09T10:08:23.828188768Z" level=info msg="StopPodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" returns successfully" Feb 9 10:08:23.828601 kubelet[2015]: E0209 10:08:23.828568 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:23.829274 env[1146]: time="2024-02-09T10:08:23.829191189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8xv4b,Uid:133f29c4-2add-444f-8ba7-b32a8c0bef25,Namespace:kube-system,Attempt:1,}" Feb 9 10:08:23.905038 systemd[1]: run-containerd-runc-k8s.io-3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4-runc.OXQvji.mount: Deactivated successfully. Feb 9 10:08:23.905132 systemd[1]: run-netns-cni\x2d41804d57\x2d8056\x2d0d61\x2d43ab\x2d6c8742ee5dd8.mount: Deactivated successfully. Feb 9 10:08:23.905180 systemd[1]: run-netns-cni\x2da1235e7e\x2d4def\x2de8f4\x2d7969\x2dd32c7674c7a9.mount: Deactivated successfully. Feb 9 10:08:23.953064 systemd-networkd[1047]: cali37604af7c36: Link UP Feb 9 10:08:23.959293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali37604af7c36: link becomes ready Feb 9 10:08:23.954060 systemd-networkd[1047]: cali37604af7c36: Gained carrier Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.878 [INFO][3504] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--7f5h4-eth0 coredns-5d78c9869d- kube-system 765577a7-f1c7-408d-8c19-952f58f5fd64 815 0 2024-02-09 10:07:57 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-7f5h4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali37604af7c36 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.878 [INFO][3504] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.911 [INFO][3533] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" HandleID="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.925 [INFO][3533] ipam_plugin.go 268: Auto assigning IP ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" HandleID="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40006900f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-7f5h4", "timestamp":"2024-02-09 10:08:23.911730136 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.925 [INFO][3533] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.925 [INFO][3533] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.925 [INFO][3533] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.926 [INFO][3533] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.931 [INFO][3533] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.934 [INFO][3533] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.936 [INFO][3533] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.938 [INFO][3533] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.938 [INFO][3533] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.940 [INFO][3533] ipam.go 1682: Creating new handle: k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8 Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.944 [INFO][3533] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.948 [INFO][3533] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.948 [INFO][3533] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" host="localhost" Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.948 [INFO][3533] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:23.990474 env[1146]: 2024-02-09 10:08:23.948 [INFO][3533] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" HandleID="k8s-pod-network.a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.991039 env[1146]: 2024-02-09 10:08:23.951 [INFO][3504] k8s.go 385: Populated endpoint ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--7f5h4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"765577a7-f1c7-408d-8c19-952f58f5fd64", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-7f5h4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37604af7c36", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:23.991039 env[1146]: 2024-02-09 10:08:23.952 [INFO][3504] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.991039 env[1146]: 2024-02-09 10:08:23.952 [INFO][3504] dataplane_linux.go 68: Setting the host side veth name to cali37604af7c36 ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.991039 env[1146]: 2024-02-09 10:08:23.962 [INFO][3504] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:23.991039 env[1146]: 2024-02-09 10:08:23.962 [INFO][3504] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--7f5h4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"765577a7-f1c7-408d-8c19-952f58f5fd64", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8", Pod:"coredns-5d78c9869d-7f5h4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37604af7c36", MAC:"3e:25:ad:d4:77:14", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:23.991039 env[1146]: 2024-02-09 10:08:23.988 [INFO][3504] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8" Namespace="kube-system" Pod="coredns-5d78c9869d-7f5h4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:24.016630 env[1146]: time="2024-02-09T10:08:24.016539453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:08:24.016630 env[1146]: time="2024-02-09T10:08:24.016587416Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:08:24.016630 env[1146]: time="2024-02-09T10:08:24.016597176Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:08:24.016838 env[1146]: time="2024-02-09T10:08:24.016738465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8 pid=3570 runtime=io.containerd.runc.v2 Feb 9 10:08:24.036363 systemd[1]: run-containerd-runc-k8s.io-a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8-runc.R5blw7.mount: Deactivated successfully. Feb 9 10:08:24.041323 systemd[1]: Started cri-containerd-a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8.scope. Feb 9 10:08:24.062799 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:08:24.062893 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2443e8cadb: link becomes ready Feb 9 10:08:24.061439 systemd-networkd[1047]: calid2443e8cadb: Link UP Feb 9 10:08:24.062919 systemd-networkd[1047]: calid2443e8cadb: Gained carrier Feb 9 10:08:24.078000 audit[3600]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:24.078000 audit[3600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffec977b20 a2=0 a3=ffff8eb64fa8 items=0 ppid=3042 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.078000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.882 [INFO][3515] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--8xv4b-eth0 coredns-5d78c9869d- kube-system 133f29c4-2add-444f-8ba7-b32a8c0bef25 816 0 2024-02-09 10:07:57 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-8xv4b eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid2443e8cadb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.882 [INFO][3515] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.917 [INFO][3538] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" HandleID="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.934 [INFO][3538] ipam_plugin.go 268: Auto assigning IP ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" HandleID="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400057f7a0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-8xv4b", "timestamp":"2024-02-09 10:08:23.917927073 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.934 [INFO][3538] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.948 [INFO][3538] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.948 [INFO][3538] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.953 [INFO][3538] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.978 [INFO][3538] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:23.999 [INFO][3538] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.006 [INFO][3538] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.011 [INFO][3538] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.011 [INFO][3538] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.025 [INFO][3538] ipam.go 1682: Creating new handle: k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873 Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.030 [INFO][3538] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.053 [INFO][3538] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.053 [INFO][3538] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" host="localhost" Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.053 [INFO][3538] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:24.084789 env[1146]: 2024-02-09 10:08:24.053 [INFO][3538] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" HandleID="k8s-pod-network.c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.085387 env[1146]: 2024-02-09 10:08:24.057 [INFO][3515] k8s.go 385: Populated endpoint ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8xv4b-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"133f29c4-2add-444f-8ba7-b32a8c0bef25", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-8xv4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2443e8cadb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:24.085387 env[1146]: 2024-02-09 10:08:24.057 [INFO][3515] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.085387 env[1146]: 2024-02-09 10:08:24.057 [INFO][3515] dataplane_linux.go 68: Setting the host side veth name to calid2443e8cadb ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.085387 env[1146]: 2024-02-09 10:08:24.063 [INFO][3515] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.085387 env[1146]: 2024-02-09 10:08:24.067 [INFO][3515] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8xv4b-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"133f29c4-2add-444f-8ba7-b32a8c0bef25", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873", Pod:"coredns-5d78c9869d-8xv4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2443e8cadb", MAC:"3e:ad:06:4b:37:ef", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:24.085387 env[1146]: 2024-02-09 10:08:24.079 [INFO][3515] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873" Namespace="kube-system" Pod="coredns-5d78c9869d-8xv4b" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit: BPF prog-id=152 op=LOAD Feb 9 10:08:24.100000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.100000 audit[3581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3570 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133626630326563346663346264326163396137343466333238326430 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3570 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133626630326563346663346264326163396137343466333238326430 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.101000 audit: BPF prog-id=153 op=LOAD Feb 9 10:08:24.101000 audit[3581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3570 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133626630326563346663346264326163396137343466333238326430 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.102000 audit: BPF prog-id=154 op=LOAD Feb 9 10:08:24.102000 audit[3581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3570 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133626630326563346663346264326163396137343466333238326430 Feb 9 10:08:24.102000 audit: BPF prog-id=154 op=UNLOAD Feb 9 10:08:24.102000 audit: BPF prog-id=153 op=UNLOAD Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { perfmon } for pid=3581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit[3581]: AVC avc: denied { bpf } for pid=3581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.103000 audit: BPF prog-id=155 op=LOAD Feb 9 10:08:24.103000 audit[3581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3570 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133626630326563346663346264326163396137343466333238326430 Feb 9 10:08:24.105611 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:08:24.107000 audit[3628]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=3628 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:24.107000 audit[3628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17900 a0=3 a1=ffffc3f3ebf0 a2=0 a3=ffffbd97ffa8 items=0 ppid=3042 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.107000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:24.108674 env[1146]: time="2024-02-09T10:08:24.108602596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:08:24.108674 env[1146]: time="2024-02-09T10:08:24.108643399Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:08:24.108674 env[1146]: time="2024-02-09T10:08:24.108653679Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:08:24.108910 env[1146]: time="2024-02-09T10:08:24.108878013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873 pid=3623 runtime=io.containerd.runc.v2 Feb 9 10:08:24.121890 systemd[1]: Started cri-containerd-c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873.scope. Feb 9 10:08:24.133432 env[1146]: time="2024-02-09T10:08:24.133392628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-7f5h4,Uid:765577a7-f1c7-408d-8c19-952f58f5fd64,Namespace:kube-system,Attempt:1,} returns sandbox id \"a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8\"" Feb 9 10:08:24.134375 kubelet[2015]: E0209 10:08:24.134005 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:24.136397 env[1146]: time="2024-02-09T10:08:24.136362244Z" level=info msg="CreateContainer within sandbox \"a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:08:24.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit: BPF prog-id=156 op=LOAD Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383130363639346265396330613664396531386661326332303136 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383130363639346265396330613664396531386661326332303136 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit: BPF prog-id=157 op=LOAD Feb 9 10:08:24.138000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383130363639346265396330613664396531386661326332303136 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.138000 audit: BPF prog-id=158 op=LOAD Feb 9 10:08:24.138000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383130363639346265396330613664396531386661326332303136 Feb 9 10:08:24.139000 audit: BPF prog-id=158 op=UNLOAD Feb 9 10:08:24.139000 audit: BPF prog-id=157 op=UNLOAD Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.139000 audit: BPF prog-id=159 op=LOAD Feb 9 10:08:24.139000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3623 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383130363639346265396330613664396531386661326332303136 Feb 9 10:08:24.143804 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:08:24.150704 env[1146]: time="2024-02-09T10:08:24.150649452Z" level=info msg="CreateContainer within sandbox \"a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2fdb695bd3c00d23128518a432dfcc0b9bb266bb6c359310d2c022a8b9d49efa\"" Feb 9 10:08:24.151325 env[1146]: time="2024-02-09T10:08:24.151282969Z" level=info msg="StartContainer for \"2fdb695bd3c00d23128518a432dfcc0b9bb266bb6c359310d2c022a8b9d49efa\"" Feb 9 10:08:24.167110 env[1146]: time="2024-02-09T10:08:24.167068586Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8xv4b,Uid:133f29c4-2add-444f-8ba7-b32a8c0bef25,Namespace:kube-system,Attempt:1,} returns sandbox id \"c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873\"" Feb 9 10:08:24.168026 kubelet[2015]: E0209 10:08:24.167930 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:24.178216 env[1146]: time="2024-02-09T10:08:24.178161564Z" level=info msg="CreateContainer within sandbox \"c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:08:24.193117 systemd[1]: Started cri-containerd-2fdb695bd3c00d23128518a432dfcc0b9bb266bb6c359310d2c022a8b9d49efa.scope. Feb 9 10:08:24.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit: BPF prog-id=160 op=LOAD Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3570 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646236393562643363303064323331323835313861343332646663 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3570 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646236393562643363303064323331323835313861343332646663 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit: BPF prog-id=161 op=LOAD Feb 9 10:08:24.213000 audit[3672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3570 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646236393562643363303064323331323835313861343332646663 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit: BPF prog-id=162 op=LOAD Feb 9 10:08:24.213000 audit[3672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3570 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646236393562643363303064323331323835313861343332646663 Feb 9 10:08:24.213000 audit: BPF prog-id=162 op=UNLOAD Feb 9 10:08:24.213000 audit: BPF prog-id=161 op=UNLOAD Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.213000 audit: BPF prog-id=163 op=LOAD Feb 9 10:08:24.213000 audit[3672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3570 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646236393562643363303064323331323835313861343332646663 Feb 9 10:08:24.225581 env[1146]: time="2024-02-09T10:08:24.225531535Z" level=info msg="CreateContainer within sandbox \"c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b7c038cf1e85e9fd2787c24f34e201b3525e9e567c80d30658dcbc354cdf5054\"" Feb 9 10:08:24.226237 env[1146]: time="2024-02-09T10:08:24.226203815Z" level=info msg="StartContainer for \"b7c038cf1e85e9fd2787c24f34e201b3525e9e567c80d30658dcbc354cdf5054\"" Feb 9 10:08:24.250167 env[1146]: time="2024-02-09T10:08:24.250052271Z" level=info msg="StartContainer for \"2fdb695bd3c00d23128518a432dfcc0b9bb266bb6c359310d2c022a8b9d49efa\" returns successfully" Feb 9 10:08:24.273388 systemd[1]: Started cri-containerd-b7c038cf1e85e9fd2787c24f34e201b3525e9e567c80d30658dcbc354cdf5054.scope. Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit: BPF prog-id=164 op=LOAD Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3623 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633033386366316538356539666432373837633234663334653230 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3623 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633033386366316538356539666432373837633234663334653230 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit: BPF prog-id=165 op=LOAD Feb 9 10:08:24.302000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3623 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633033386366316538356539666432373837633234663334653230 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit: BPF prog-id=166 op=LOAD Feb 9 10:08:24.302000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3623 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633033386366316538356539666432373837633234663334653230 Feb 9 10:08:24.302000 audit: BPF prog-id=166 op=UNLOAD Feb 9 10:08:24.302000 audit: BPF prog-id=165 op=UNLOAD Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.302000 audit: BPF prog-id=167 op=LOAD Feb 9 10:08:24.302000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3623 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237633033386366316538356539666432373837633234663334653230 Feb 9 10:08:24.337339 systemd-networkd[1047]: cali22d455643b8: Gained IPv6LL Feb 9 10:08:24.347417 env[1146]: time="2024-02-09T10:08:24.347366966Z" level=info msg="StartContainer for \"b7c038cf1e85e9fd2787c24f34e201b3525e9e567c80d30658dcbc354cdf5054\" returns successfully" Feb 9 10:08:24.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.126:22-10.0.0.1:47238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:24.464300 systemd[1]: Started sshd@11-10.0.0.126:22-10.0.0.1:47238.service. Feb 9 10:08:24.468703 sshd[3428]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:24.470000 audit[3428]: USER_END pid=3428 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.470000 audit[3428]: CRED_DISP pid=3428 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.126:22-10.0.0.1:47228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:24.479444 systemd[1]: sshd@10-10.0.0.126:22-10.0.0.1:47228.service: Deactivated successfully. Feb 9 10:08:24.480212 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 10:08:24.484332 systemd-logind[1132]: Session 11 logged out. Waiting for processes to exit. Feb 9 10:08:24.484770 env[1146]: time="2024-02-09T10:08:24.484572708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:24.486532 env[1146]: time="2024-02-09T10:08:24.486492302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:24.487830 systemd-logind[1132]: Removed session 11. Feb 9 10:08:24.489129 env[1146]: time="2024-02-09T10:08:24.489099857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:24.489563 env[1146]: time="2024-02-09T10:08:24.489537003Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:24.490330 env[1146]: time="2024-02-09T10:08:24.490300408Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 10:08:24.494141 env[1146]: time="2024-02-09T10:08:24.494071352Z" level=info msg="CreateContainer within sandbox \"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:08:24.508982 env[1146]: time="2024-02-09T10:08:24.508872430Z" level=info msg="CreateContainer within sandbox \"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ded9ddeb176a10188ac2b376e1a13bf969005e758495dc83163883b82526c19c\"" Feb 9 10:08:24.511301 env[1146]: time="2024-02-09T10:08:24.510424242Z" level=info msg="StartContainer for \"ded9ddeb176a10188ac2b376e1a13bf969005e758495dc83163883b82526c19c\"" Feb 9 10:08:24.517000 audit[3747]: USER_ACCT pid=3747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.517979 sshd[3747]: Accepted publickey for core from 10.0.0.1 port 47238 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:24.519000 audit[3747]: CRED_ACQ pid=3747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.519000 audit[3747]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffea2bca0 a2=3 a3=1 items=0 ppid=1 pid=3747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.519000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:24.519889 sshd[3747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:24.524368 systemd[1]: Started session-12.scope. Feb 9 10:08:24.524895 systemd-logind[1132]: New session 12 of user core. Feb 9 10:08:24.529447 systemd[1]: Started cri-containerd-ded9ddeb176a10188ac2b376e1a13bf969005e758495dc83163883b82526c19c.scope. Feb 9 10:08:24.535000 audit[3747]: USER_START pid=3747 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.536000 audit[3770]: CRED_ACQ pid=3770 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3375 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643964646562313736613130313838616332623337366531613133 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit: BPF prog-id=168 op=LOAD Feb 9 10:08:24.560000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3375 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643964646562313736613130313838616332623337366531613133 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.560000 audit: BPF prog-id=169 op=LOAD Feb 9 10:08:24.560000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3375 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643964646562313736613130313838616332623337366531613133 Feb 9 10:08:24.561000 audit: BPF prog-id=169 op=UNLOAD Feb 9 10:08:24.561000 audit: BPF prog-id=168 op=UNLOAD Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:24.561000 audit: BPF prog-id=170 op=LOAD Feb 9 10:08:24.561000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3375 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:24.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643964646562313736613130313838616332623337366531613133 Feb 9 10:08:24.583876 env[1146]: time="2024-02-09T10:08:24.583791276Z" level=info msg="StartContainer for \"ded9ddeb176a10188ac2b376e1a13bf969005e758495dc83163883b82526c19c\" returns successfully" Feb 9 10:08:24.586668 env[1146]: time="2024-02-09T10:08:24.586633965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:08:24.651981 sshd[3747]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:24.652000 audit[3747]: USER_END pid=3747 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.652000 audit[3747]: CRED_DISP pid=3747 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:24.654755 systemd-logind[1132]: Session 12 logged out. Waiting for processes to exit. Feb 9 10:08:24.655540 systemd[1]: sshd@11-10.0.0.126:22-10.0.0.1:47238.service: Deactivated successfully. Feb 9 10:08:24.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.126:22-10.0.0.1:47238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:24.656368 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 10:08:24.656840 systemd-logind[1132]: Removed session 12. Feb 9 10:08:24.851705 kubelet[2015]: E0209 10:08:24.849399 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:24.859036 kubelet[2015]: E0209 10:08:24.859011 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:24.906296 kubelet[2015]: I0209 10:08:24.904522 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-8xv4b" podStartSLOduration=27.904487588 podCreationTimestamp="2024-02-09 10:07:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:08:24.903929875 +0000 UTC m=+42.300226574" watchObservedRunningTime="2024-02-09 10:08:24.904487588 +0000 UTC m=+42.300784327" Feb 9 10:08:24.990843 kubelet[2015]: I0209 10:08:24.990802 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-7f5h4" podStartSLOduration=27.990763508 podCreationTimestamp="2024-02-09 10:07:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:08:24.981350509 +0000 UTC m=+42.377647208" watchObservedRunningTime="2024-02-09 10:08:24.990763508 +0000 UTC m=+42.387060247" Feb 9 10:08:25.000000 audit[3796]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:25.000000 audit[3796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffde1c33f0 a2=0 a3=ffff967d16c0 items=0 ppid=2184 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:25.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:25.000000 audit[3796]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:25.000000 audit[3796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffde1c33f0 a2=0 a3=ffff967d16c0 items=0 ppid=2184 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:25.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:25.011000 audit[3798]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:25.011000 audit[3798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd0589140 a2=0 a3=ffffa43546c0 items=0 ppid=2184 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:25.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:25.020000 audit[3798]: NETFILTER_CFG table=nat:107 family=2 entries=47 op=nft_register_chain pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:25.020000 audit[3798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffd0589140 a2=0 a3=ffffa43546c0 items=0 ppid=2184 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:25.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:25.415437 systemd-networkd[1047]: cali37604af7c36: Gained IPv6LL Feb 9 10:08:25.798402 systemd-networkd[1047]: calid2443e8cadb: Gained IPv6LL Feb 9 10:08:25.863617 kubelet[2015]: E0209 10:08:25.863593 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:25.864087 kubelet[2015]: E0209 10:08:25.863925 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:26.114746 env[1146]: time="2024-02-09T10:08:26.114637586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:26.116077 env[1146]: time="2024-02-09T10:08:26.116053146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:26.117566 env[1146]: time="2024-02-09T10:08:26.117474187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:26.118777 env[1146]: time="2024-02-09T10:08:26.118741938Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:26.119157 env[1146]: time="2024-02-09T10:08:26.119128080Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:08:26.120904 env[1146]: time="2024-02-09T10:08:26.120870378Z" level=info msg="CreateContainer within sandbox \"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:08:26.132952 env[1146]: time="2024-02-09T10:08:26.132905259Z" level=info msg="CreateContainer within sandbox \"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0180265efe52299d260406d803bb240bd05e034ccc900c9de4f167971c86719e\"" Feb 9 10:08:26.133517 env[1146]: time="2024-02-09T10:08:26.133463730Z" level=info msg="StartContainer for \"0180265efe52299d260406d803bb240bd05e034ccc900c9de4f167971c86719e\"" Feb 9 10:08:26.152605 systemd[1]: Started cri-containerd-0180265efe52299d260406d803bb240bd05e034ccc900c9de4f167971c86719e.scope. Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3375 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031383032363565666535323239396432363034303664383033626232 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit: BPF prog-id=171 op=LOAD Feb 9 10:08:26.181000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3375 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031383032363565666535323239396432363034303664383033626232 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit: BPF prog-id=172 op=LOAD Feb 9 10:08:26.181000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3375 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031383032363565666535323239396432363034303664383033626232 Feb 9 10:08:26.181000 audit: BPF prog-id=172 op=UNLOAD Feb 9 10:08:26.181000 audit: BPF prog-id=171 op=UNLOAD Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.181000 audit: BPF prog-id=173 op=LOAD Feb 9 10:08:26.181000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3375 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031383032363565666535323239396432363034303664383033626232 Feb 9 10:08:26.195532 env[1146]: time="2024-02-09T10:08:26.195487316Z" level=info msg="StartContainer for \"0180265efe52299d260406d803bb240bd05e034ccc900c9de4f167971c86719e\" returns successfully" Feb 9 10:08:26.731978 env[1146]: time="2024-02-09T10:08:26.731431171Z" level=info msg="StopPodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\"" Feb 9 10:08:26.794964 kubelet[2015]: I0209 10:08:26.794935 2015 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:08:26.794964 kubelet[2015]: I0209 10:08:26.794970 2015 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.771 [INFO][3861] k8s.go 578: Cleaning up netns ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.774 [INFO][3861] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" iface="eth0" netns="/var/run/netns/cni-e61dcf80-f165-1b10-612e-e6fe880250b2" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.774 [INFO][3861] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" iface="eth0" netns="/var/run/netns/cni-e61dcf80-f165-1b10-612e-e6fe880250b2" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.775 [INFO][3861] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" iface="eth0" netns="/var/run/netns/cni-e61dcf80-f165-1b10-612e-e6fe880250b2" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.775 [INFO][3861] k8s.go 585: Releasing IP address(es) ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.775 [INFO][3861] utils.go 188: Calico CNI releasing IP address ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.794 [INFO][3869] ipam_plugin.go 415: Releasing address using handleID ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.794 [INFO][3869] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.794 [INFO][3869] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.803 [WARNING][3869] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.803 [INFO][3869] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.804 [INFO][3869] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:26.808350 env[1146]: 2024-02-09 10:08:26.806 [INFO][3861] k8s.go 591: Teardown processing complete. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:26.809195 env[1146]: time="2024-02-09T10:08:26.809150044Z" level=info msg="TearDown network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" successfully" Feb 9 10:08:26.809311 env[1146]: time="2024-02-09T10:08:26.809291452Z" level=info msg="StopPodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" returns successfully" Feb 9 10:08:26.810112 env[1146]: time="2024-02-09T10:08:26.810082457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68759dd98f-h726l,Uid:8a114f4e-6fa9-41cd-8fc6-a35a024358f2,Namespace:calico-system,Attempt:1,}" Feb 9 10:08:26.810930 systemd[1]: run-netns-cni\x2de61dcf80\x2df165\x2d1b10\x2d612e\x2de6fe880250b2.mount: Deactivated successfully. Feb 9 10:08:26.867123 kubelet[2015]: E0209 10:08:26.867078 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:26.868191 kubelet[2015]: E0209 10:08:26.868163 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:08:26.877208 kubelet[2015]: I0209 10:08:26.877154 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-p9jm6" podStartSLOduration=21.878521521 podCreationTimestamp="2024-02-09 10:08:02 +0000 UTC" firstStartedPulling="2024-02-09 10:08:23.120738087 +0000 UTC m=+40.517034826" lastFinishedPulling="2024-02-09 10:08:26.119338132 +0000 UTC m=+43.515634871" observedRunningTime="2024-02-09 10:08:26.876002463 +0000 UTC m=+44.272299202" watchObservedRunningTime="2024-02-09 10:08:26.877121566 +0000 UTC m=+44.273418305" Feb 9 10:08:26.919754 systemd-networkd[1047]: califf2919d8a12: Link UP Feb 9 10:08:26.922105 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:08:26.922171 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf2919d8a12: link becomes ready Feb 9 10:08:26.921891 systemd-networkd[1047]: califf2919d8a12: Gained carrier Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.851 [INFO][3876] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0 calico-kube-controllers-68759dd98f- calico-system 8a114f4e-6fa9-41cd-8fc6-a35a024358f2 888 0 2024-02-09 10:08:02 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:68759dd98f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-68759dd98f-h726l eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califf2919d8a12 [] []}} ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.852 [INFO][3876] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.883 [INFO][3890] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" HandleID="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.894 [INFO][3890] ipam_plugin.go 268: Auto assigning IP ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" HandleID="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c040), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-68759dd98f-h726l", "timestamp":"2024-02-09 10:08:26.883431763 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.894 [INFO][3890] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.894 [INFO][3890] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.894 [INFO][3890] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.896 [INFO][3890] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.900 [INFO][3890] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.904 [INFO][3890] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.905 [INFO][3890] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.907 [INFO][3890] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.907 [INFO][3890] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.908 [INFO][3890] ipam.go 1682: Creating new handle: k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685 Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.911 [INFO][3890] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.915 [INFO][3890] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.915 [INFO][3890] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" host="localhost" Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.915 [INFO][3890] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:26.933024 env[1146]: 2024-02-09 10:08:26.915 [INFO][3890] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" HandleID="k8s-pod-network.5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.933575 env[1146]: 2024-02-09 10:08:26.917 [INFO][3876] k8s.go 385: Populated endpoint ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0", GenerateName:"calico-kube-controllers-68759dd98f-", Namespace:"calico-system", SelfLink:"", UID:"8a114f4e-6fa9-41cd-8fc6-a35a024358f2", ResourceVersion:"888", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68759dd98f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-68759dd98f-h726l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf2919d8a12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:26.933575 env[1146]: 2024-02-09 10:08:26.917 [INFO][3876] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.933575 env[1146]: 2024-02-09 10:08:26.917 [INFO][3876] dataplane_linux.go 68: Setting the host side veth name to califf2919d8a12 ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.933575 env[1146]: 2024-02-09 10:08:26.922 [INFO][3876] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.933575 env[1146]: 2024-02-09 10:08:26.922 [INFO][3876] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0", GenerateName:"calico-kube-controllers-68759dd98f-", Namespace:"calico-system", SelfLink:"", UID:"8a114f4e-6fa9-41cd-8fc6-a35a024358f2", ResourceVersion:"888", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68759dd98f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685", Pod:"calico-kube-controllers-68759dd98f-h726l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf2919d8a12", MAC:"72:cb:f7:18:50:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:26.933575 env[1146]: 2024-02-09 10:08:26.929 [INFO][3876] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685" Namespace="calico-system" Pod="calico-kube-controllers-68759dd98f-h726l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:26.946000 audit[3917]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=3917 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:08:26.946000 audit[3917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffdcf97c00 a2=0 a3=ffff92aacfa8 items=0 ppid=3042 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.946000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:08:26.947566 env[1146]: time="2024-02-09T10:08:26.947515025Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:08:26.947646 env[1146]: time="2024-02-09T10:08:26.947581109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:08:26.947646 env[1146]: time="2024-02-09T10:08:26.947607870Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:08:26.947820 env[1146]: time="2024-02-09T10:08:26.947790120Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685 pid=3922 runtime=io.containerd.runc.v2 Feb 9 10:08:26.958553 systemd[1]: Started cri-containerd-5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685.scope. Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit: BPF prog-id=174 op=LOAD Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3922 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538303937353263346630616162653935646237626664623062656333 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3922 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538303937353263346630616162653935646237626664623062656333 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit: BPF prog-id=175 op=LOAD Feb 9 10:08:26.990000 audit[3932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3922 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538303937353263346630616162653935646237626664623062656333 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.990000 audit: BPF prog-id=176 op=LOAD Feb 9 10:08:26.990000 audit[3932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3922 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538303937353263346630616162653935646237626664623062656333 Feb 9 10:08:26.991000 audit: BPF prog-id=176 op=UNLOAD Feb 9 10:08:26.991000 audit: BPF prog-id=175 op=UNLOAD Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:26.991000 audit: BPF prog-id=177 op=LOAD Feb 9 10:08:26.991000 audit[3932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3922 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:26.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538303937353263346630616162653935646237626664623062656333 Feb 9 10:08:26.991997 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:08:27.009290 env[1146]: time="2024-02-09T10:08:27.009253103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68759dd98f-h726l,Uid:8a114f4e-6fa9-41cd-8fc6-a35a024358f2,Namespace:calico-system,Attempt:1,} returns sandbox id \"5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685\"" Feb 9 10:08:27.010831 env[1146]: time="2024-02-09T10:08:27.010790428Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 10:08:28.294412 systemd-networkd[1047]: califf2919d8a12: Gained IPv6LL Feb 9 10:08:28.839454 env[1146]: time="2024-02-09T10:08:28.839403648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:28.840965 env[1146]: time="2024-02-09T10:08:28.840934691Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:28.842559 env[1146]: time="2024-02-09T10:08:28.842533497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:28.843792 env[1146]: time="2024-02-09T10:08:28.843758523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:08:28.844306 env[1146]: time="2024-02-09T10:08:28.844282472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 10:08:28.853173 env[1146]: time="2024-02-09T10:08:28.853135710Z" level=info msg="CreateContainer within sandbox \"5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 10:08:28.861545 env[1146]: time="2024-02-09T10:08:28.861506282Z" level=info msg="CreateContainer within sandbox \"5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1e9c1a97df4cb7bde3c7a80cc1753ce222c0c7b754901e0b44dc05be7054d15f\"" Feb 9 10:08:28.862109 env[1146]: time="2024-02-09T10:08:28.862082114Z" level=info msg="StartContainer for \"1e9c1a97df4cb7bde3c7a80cc1753ce222c0c7b754901e0b44dc05be7054d15f\"" Feb 9 10:08:28.877905 systemd[1]: Started cri-containerd-1e9c1a97df4cb7bde3c7a80cc1753ce222c0c7b754901e0b44dc05be7054d15f.scope. Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.912939 kernel: kauditd_printk_skb: 475 callbacks suppressed Feb 9 10:08:28.912998 kernel: audit: type=1400 audit(1707473308.909:1331): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913029 kernel: audit: type=1400 audit(1707473308.909:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.916489 kernel: audit: type=1400 audit(1707473308.909:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.916535 kernel: audit: type=1400 audit(1707473308.909:1334): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.918277 kernel: audit: type=1400 audit(1707473308.909:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.923126 kernel: audit: type=1400 audit(1707473308.909:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.926965 kernel: audit: type=1400 audit(1707473308.909:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.927015 kernel: audit: type=1400 audit(1707473308.909:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.929483 kernel: audit: type=1400 audit(1707473308.909:1339): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.929531 kernel: audit: type=1400 audit(1707473308.909:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.909000 audit: BPF prog-id=178 op=LOAD Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3922 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:28.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165396331613937646634636237626465336337613830636331373533 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3922 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:28.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165396331613937646634636237626465336337613830636331373533 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.913000 audit: BPF prog-id=179 op=LOAD Feb 9 10:08:28.913000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3922 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:28.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165396331613937646634636237626465336337613830636331373533 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.915000 audit: BPF prog-id=180 op=LOAD Feb 9 10:08:28.915000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3922 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:28.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165396331613937646634636237626465336337613830636331373533 Feb 9 10:08:28.917000 audit: BPF prog-id=180 op=UNLOAD Feb 9 10:08:28.917000 audit: BPF prog-id=179 op=UNLOAD Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:08:28.917000 audit: BPF prog-id=181 op=LOAD Feb 9 10:08:28.917000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3922 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:28.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165396331613937646634636237626465336337613830636331373533 Feb 9 10:08:28.952364 env[1146]: time="2024-02-09T10:08:28.952324591Z" level=info msg="StartContainer for \"1e9c1a97df4cb7bde3c7a80cc1753ce222c0c7b754901e0b44dc05be7054d15f\" returns successfully" Feb 9 10:08:29.656674 systemd[1]: Started sshd@12-10.0.0.126:22-10.0.0.1:47244.service. Feb 9 10:08:29.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.126:22-10.0.0.1:47244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:29.698000 audit[4007]: USER_ACCT pid=4007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:29.699840 sshd[4007]: Accepted publickey for core from 10.0.0.1 port 47244 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:29.699000 audit[4007]: CRED_ACQ pid=4007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:29.699000 audit[4007]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccc91180 a2=3 a3=1 items=0 ppid=1 pid=4007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:29.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:29.701525 sshd[4007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:29.705240 systemd-logind[1132]: New session 13 of user core. Feb 9 10:08:29.705694 systemd[1]: Started session-13.scope. Feb 9 10:08:29.708000 audit[4007]: USER_START pid=4007 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:29.709000 audit[4009]: CRED_ACQ pid=4009 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:29.826455 sshd[4007]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:29.826000 audit[4007]: USER_END pid=4007 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:29.826000 audit[4007]: CRED_DISP pid=4007 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:29.828891 systemd[1]: sshd@12-10.0.0.126:22-10.0.0.1:47244.service: Deactivated successfully. Feb 9 10:08:29.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.126:22-10.0.0.1:47244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:29.829713 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 10:08:29.830228 systemd-logind[1132]: Session 13 logged out. Waiting for processes to exit. Feb 9 10:08:29.830968 systemd-logind[1132]: Removed session 13. Feb 9 10:08:29.892773 kubelet[2015]: I0209 10:08:29.892741 2015 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-68759dd98f-h726l" podStartSLOduration=26.058490491 podCreationTimestamp="2024-02-09 10:08:02 +0000 UTC" firstStartedPulling="2024-02-09 10:08:27.010298241 +0000 UTC m=+44.406594940" lastFinishedPulling="2024-02-09 10:08:28.844510964 +0000 UTC m=+46.240807703" observedRunningTime="2024-02-09 10:08:29.887957963 +0000 UTC m=+47.284254702" watchObservedRunningTime="2024-02-09 10:08:29.892703254 +0000 UTC m=+47.288999993" Feb 9 10:08:34.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.126:22-10.0.0.1:34036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:34.830926 systemd[1]: Started sshd@13-10.0.0.126:22-10.0.0.1:34036.service. Feb 9 10:08:34.831685 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 9 10:08:34.831726 kernel: audit: type=1130 audit(1707473314.829:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.126:22-10.0.0.1:34036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:34.872000 audit[4047]: USER_ACCT pid=4047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.873594 sshd[4047]: Accepted publickey for core from 10.0.0.1 port 34036 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:34.874777 sshd[4047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:34.873000 audit[4047]: CRED_ACQ pid=4047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.878270 kernel: audit: type=1101 audit(1707473314.872:1359): pid=4047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.878343 kernel: audit: type=1103 audit(1707473314.873:1360): pid=4047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.878367 kernel: audit: type=1006 audit(1707473314.873:1361): pid=4047 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 10:08:34.873000 audit[4047]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfcdb170 a2=3 a3=1 items=0 ppid=1 pid=4047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:34.879435 systemd-logind[1132]: New session 14 of user core. Feb 9 10:08:34.879908 systemd[1]: Started session-14.scope. Feb 9 10:08:34.881823 kernel: audit: type=1300 audit(1707473314.873:1361): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfcdb170 a2=3 a3=1 items=0 ppid=1 pid=4047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:34.881876 kernel: audit: type=1327 audit(1707473314.873:1361): proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:34.873000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:34.882000 audit[4047]: USER_START pid=4047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.883000 audit[4049]: CRED_ACQ pid=4049 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.889051 kernel: audit: type=1105 audit(1707473314.882:1362): pid=4047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.889132 kernel: audit: type=1103 audit(1707473314.883:1363): pid=4049 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:34.997560 sshd[4047]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:34.998000 audit[4047]: USER_END pid=4047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:35.001363 systemd[1]: sshd@13-10.0.0.126:22-10.0.0.1:34036.service: Deactivated successfully. Feb 9 10:08:35.002149 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 10:08:34.998000 audit[4047]: CRED_DISP pid=4047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:35.004161 systemd-logind[1132]: Session 14 logged out. Waiting for processes to exit. Feb 9 10:08:35.004661 kernel: audit: type=1106 audit(1707473314.998:1364): pid=4047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:35.004723 kernel: audit: type=1104 audit(1707473314.998:1365): pid=4047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:35.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.126:22-10.0.0.1:34036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:35.005061 systemd-logind[1132]: Removed session 14. Feb 9 10:08:39.733000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.733000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.733000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4010e82360 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:08:39.733000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400943f1e0 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:08:39.733000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:08:39.733000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.733000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4010e82390 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:08:39.733000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:08:39.733000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:08:39.745000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.745000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400137dbc0 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:08:39.745000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:08:39.769000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.769000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400aef82d0 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:08:39.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:08:39.769000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.769000 audit[1893]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400943f220 a2=fc6 a3=0 items=0 ppid=1740 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c836 key=(null) Feb 9 10:08:39.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 9 10:08:39.877000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.879635 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 10:08:39.879672 kernel: audit: type=1400 audit(1707473319.877:1373): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.877000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001e508a0 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:39.885065 kernel: audit: type=1300 audit(1707473319.877:1373): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001e508a0 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:39.885115 kernel: audit: type=1327 audit(1707473319.877:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:39.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:39.878000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.889724 kernel: audit: type=1400 audit(1707473319.878:1374): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:39.889762 kernel: audit: type=1300 audit(1707473319.878:1374): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027da220 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:39.878000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027da220 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:39.878000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:39.895102 kernel: audit: type=1327 audit(1707473319.878:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:40.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.126:22-10.0.0.1:34048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:40.002601 systemd[1]: Started sshd@14-10.0.0.126:22-10.0.0.1:34048.service. Feb 9 10:08:40.005267 kernel: audit: type=1130 audit(1707473320.001:1375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.126:22-10.0.0.1:34048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:40.039000 audit[4071]: USER_ACCT pid=4071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.040687 sshd[4071]: Accepted publickey for core from 10.0.0.1 port 34048 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:40.041648 sshd[4071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:40.040000 audit[4071]: CRED_ACQ pid=4071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.045264 kernel: audit: type=1101 audit(1707473320.039:1376): pid=4071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.045329 kernel: audit: type=1103 audit(1707473320.040:1377): pid=4071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.045350 kernel: audit: type=1006 audit(1707473320.040:1378): pid=4071 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 10:08:40.045414 systemd-logind[1132]: New session 15 of user core. Feb 9 10:08:40.045661 systemd[1]: Started session-15.scope. Feb 9 10:08:40.040000 audit[4071]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3b65920 a2=3 a3=1 items=0 ppid=1 pid=4071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:40.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:40.049000 audit[4071]: USER_START pid=4071 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.050000 audit[4073]: CRED_ACQ pid=4073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.162293 sshd[4071]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:40.163000 audit[4071]: USER_END pid=4071 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.163000 audit[4071]: CRED_DISP pid=4071 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:40.167227 systemd[1]: sshd@14-10.0.0.126:22-10.0.0.1:34048.service: Deactivated successfully. Feb 9 10:08:40.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.126:22-10.0.0.1:34048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:40.168034 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 10:08:40.168583 systemd-logind[1132]: Session 15 logged out. Waiting for processes to exit. Feb 9 10:08:40.169235 systemd-logind[1132]: Removed session 15. Feb 9 10:08:42.711885 env[1146]: time="2024-02-09T10:08:42.711799369Z" level=info msg="StopPodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\"" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.752 [WARNING][4098] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--7f5h4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"765577a7-f1c7-408d-8c19-952f58f5fd64", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8", Pod:"coredns-5d78c9869d-7f5h4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37604af7c36", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.752 [INFO][4098] k8s.go 578: Cleaning up netns ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.752 [INFO][4098] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" iface="eth0" netns="" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.752 [INFO][4098] k8s.go 585: Releasing IP address(es) ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.752 [INFO][4098] utils.go 188: Calico CNI releasing IP address ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.773 [INFO][4108] ipam_plugin.go 415: Releasing address using handleID ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.774 [INFO][4108] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.774 [INFO][4108] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.783 [WARNING][4108] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.783 [INFO][4108] ipam_plugin.go 443: Releasing address using workloadID ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.785 [INFO][4108] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:42.788156 env[1146]: 2024-02-09 10:08:42.786 [INFO][4098] k8s.go 591: Teardown processing complete. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.788616 env[1146]: time="2024-02-09T10:08:42.788185480Z" level=info msg="TearDown network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" successfully" Feb 9 10:08:42.788616 env[1146]: time="2024-02-09T10:08:42.788218082Z" level=info msg="StopPodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" returns successfully" Feb 9 10:08:42.789108 env[1146]: time="2024-02-09T10:08:42.789062118Z" level=info msg="RemovePodSandbox for \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\"" Feb 9 10:08:42.789183 env[1146]: time="2024-02-09T10:08:42.789103840Z" level=info msg="Forcibly stopping sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\"" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.826 [WARNING][4131] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--7f5h4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"765577a7-f1c7-408d-8c19-952f58f5fd64", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3bf02ec4fc4bd2ac9a744f3282d0eece01f6342bc9564728a7f54e5c11d24f8", Pod:"coredns-5d78c9869d-7f5h4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali37604af7c36", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.826 [INFO][4131] k8s.go 578: Cleaning up netns ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.826 [INFO][4131] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" iface="eth0" netns="" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.826 [INFO][4131] k8s.go 585: Releasing IP address(es) ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.826 [INFO][4131] utils.go 188: Calico CNI releasing IP address ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.844 [INFO][4139] ipam_plugin.go 415: Releasing address using handleID ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.844 [INFO][4139] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.844 [INFO][4139] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.854 [WARNING][4139] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.854 [INFO][4139] ipam_plugin.go 443: Releasing address using workloadID ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" HandleID="k8s-pod-network.efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Workload="localhost-k8s-coredns--5d78c9869d--7f5h4-eth0" Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.855 [INFO][4139] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:42.858863 env[1146]: 2024-02-09 10:08:42.857 [INFO][4131] k8s.go 591: Teardown processing complete. ContainerID="efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd" Feb 9 10:08:42.859330 env[1146]: time="2024-02-09T10:08:42.858894025Z" level=info msg="TearDown network for sandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" successfully" Feb 9 10:08:42.958790 env[1146]: time="2024-02-09T10:08:42.958716033Z" level=info msg="RemovePodSandbox \"efb3af285944cedb3d32769c3646ee5f4c46fe85b3e6abf78688a8ee9136ddbd\" returns successfully" Feb 9 10:08:42.959236 env[1146]: time="2024-02-09T10:08:42.959208014Z" level=info msg="StopPodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\"" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:42.991 [WARNING][4164] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0", GenerateName:"calico-kube-controllers-68759dd98f-", Namespace:"calico-system", SelfLink:"", UID:"8a114f4e-6fa9-41cd-8fc6-a35a024358f2", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68759dd98f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685", Pod:"calico-kube-controllers-68759dd98f-h726l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf2919d8a12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:42.991 [INFO][4164] k8s.go 578: Cleaning up netns ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:42.991 [INFO][4164] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" iface="eth0" netns="" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:42.991 [INFO][4164] k8s.go 585: Releasing IP address(es) ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:42.991 [INFO][4164] utils.go 188: Calico CNI releasing IP address ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.008 [INFO][4171] ipam_plugin.go 415: Releasing address using handleID ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.008 [INFO][4171] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.008 [INFO][4171] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.018 [WARNING][4171] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.018 [INFO][4171] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.019 [INFO][4171] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:43.023132 env[1146]: 2024-02-09 10:08:43.021 [INFO][4164] k8s.go 591: Teardown processing complete. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.023713 env[1146]: time="2024-02-09T10:08:43.023669398Z" level=info msg="TearDown network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" successfully" Feb 9 10:08:43.023780 env[1146]: time="2024-02-09T10:08:43.023765282Z" level=info msg="StopPodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" returns successfully" Feb 9 10:08:43.024405 env[1146]: time="2024-02-09T10:08:43.024382629Z" level=info msg="RemovePodSandbox for \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\"" Feb 9 10:08:43.024534 env[1146]: time="2024-02-09T10:08:43.024497954Z" level=info msg="Forcibly stopping sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\"" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.059 [WARNING][4196] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0", GenerateName:"calico-kube-controllers-68759dd98f-", Namespace:"calico-system", SelfLink:"", UID:"8a114f4e-6fa9-41cd-8fc6-a35a024358f2", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68759dd98f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5809752c4f0aabe95db7bfdb0bec38b9aafa7271b2c935cc81ab71e4b8074685", Pod:"calico-kube-controllers-68759dd98f-h726l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf2919d8a12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.059 [INFO][4196] k8s.go 578: Cleaning up netns ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.059 [INFO][4196] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" iface="eth0" netns="" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.059 [INFO][4196] k8s.go 585: Releasing IP address(es) ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.059 [INFO][4196] utils.go 188: Calico CNI releasing IP address ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.076 [INFO][4205] ipam_plugin.go 415: Releasing address using handleID ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.076 [INFO][4205] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.076 [INFO][4205] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.085 [WARNING][4205] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.085 [INFO][4205] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" HandleID="k8s-pod-network.ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Workload="localhost-k8s-calico--kube--controllers--68759dd98f--h726l-eth0" Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.087 [INFO][4205] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:43.090704 env[1146]: 2024-02-09 10:08:43.089 [INFO][4196] k8s.go 591: Teardown processing complete. ContainerID="ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5" Feb 9 10:08:43.090704 env[1146]: time="2024-02-09T10:08:43.090730515Z" level=info msg="TearDown network for sandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" successfully" Feb 9 10:08:43.093579 env[1146]: time="2024-02-09T10:08:43.093541635Z" level=info msg="RemovePodSandbox \"ff278368d821cc6dd7fee7b45858cbe2ab7e6d2939d2ca9e88cf9c56ea0834c5\" returns successfully" Feb 9 10:08:43.094034 env[1146]: time="2024-02-09T10:08:43.094005415Z" level=info msg="StopPodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\"" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.126 [WARNING][4227] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p9jm6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4456e44a-abbe-4da2-85d0-ed59b572ad98", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4", Pod:"csi-node-driver-p9jm6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali22d455643b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.126 [INFO][4227] k8s.go 578: Cleaning up netns ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.126 [INFO][4227] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" iface="eth0" netns="" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.126 [INFO][4227] k8s.go 585: Releasing IP address(es) ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.126 [INFO][4227] utils.go 188: Calico CNI releasing IP address ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.143 [INFO][4235] ipam_plugin.go 415: Releasing address using handleID ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.144 [INFO][4235] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.144 [INFO][4235] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.154 [WARNING][4235] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.154 [INFO][4235] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.156 [INFO][4235] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:43.159395 env[1146]: 2024-02-09 10:08:43.157 [INFO][4227] k8s.go 591: Teardown processing complete. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.159816 env[1146]: time="2024-02-09T10:08:43.159417581Z" level=info msg="TearDown network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" successfully" Feb 9 10:08:43.159816 env[1146]: time="2024-02-09T10:08:43.159447822Z" level=info msg="StopPodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" returns successfully" Feb 9 10:08:43.160293 env[1146]: time="2024-02-09T10:08:43.160251857Z" level=info msg="RemovePodSandbox for \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\"" Feb 9 10:08:43.160367 env[1146]: time="2024-02-09T10:08:43.160301299Z" level=info msg="Forcibly stopping sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\"" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.193 [WARNING][4258] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p9jm6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4456e44a-abbe-4da2-85d0-ed59b572ad98", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3af54f7b79cc7842fea23e5e3ddc3fad5b00ff126715762b19376e7fa4049da4", Pod:"csi-node-driver-p9jm6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali22d455643b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.193 [INFO][4258] k8s.go 578: Cleaning up netns ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.193 [INFO][4258] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" iface="eth0" netns="" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.193 [INFO][4258] k8s.go 585: Releasing IP address(es) ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.193 [INFO][4258] utils.go 188: Calico CNI releasing IP address ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.209 [INFO][4266] ipam_plugin.go 415: Releasing address using handleID ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.209 [INFO][4266] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.209 [INFO][4266] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.219 [WARNING][4266] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.219 [INFO][4266] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" HandleID="k8s-pod-network.b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Workload="localhost-k8s-csi--node--driver--p9jm6-eth0" Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.221 [INFO][4266] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:43.224089 env[1146]: 2024-02-09 10:08:43.222 [INFO][4258] k8s.go 591: Teardown processing complete. ContainerID="b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4" Feb 9 10:08:43.224522 env[1146]: time="2024-02-09T10:08:43.224133077Z" level=info msg="TearDown network for sandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" successfully" Feb 9 10:08:43.226755 env[1146]: time="2024-02-09T10:08:43.226719828Z" level=info msg="RemovePodSandbox \"b2fad3359104cd1891b184c855b65cf7bedebffae553a189d6c0107f6a6f2cb4\" returns successfully" Feb 9 10:08:43.227211 env[1146]: time="2024-02-09T10:08:43.227171887Z" level=info msg="StopPodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\"" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.259 [WARNING][4289] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8xv4b-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"133f29c4-2add-444f-8ba7-b32a8c0bef25", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873", Pod:"coredns-5d78c9869d-8xv4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2443e8cadb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.259 [INFO][4289] k8s.go 578: Cleaning up netns ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.259 [INFO][4289] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" iface="eth0" netns="" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.259 [INFO][4289] k8s.go 585: Releasing IP address(es) ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.259 [INFO][4289] utils.go 188: Calico CNI releasing IP address ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.276 [INFO][4297] ipam_plugin.go 415: Releasing address using handleID ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.276 [INFO][4297] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.276 [INFO][4297] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.285 [WARNING][4297] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.285 [INFO][4297] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.286 [INFO][4297] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:43.289697 env[1146]: 2024-02-09 10:08:43.288 [INFO][4289] k8s.go 591: Teardown processing complete. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.289697 env[1146]: time="2024-02-09T10:08:43.289666088Z" level=info msg="TearDown network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" successfully" Feb 9 10:08:43.290112 env[1146]: time="2024-02-09T10:08:43.289701449Z" level=info msg="StopPodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" returns successfully" Feb 9 10:08:43.291063 env[1146]: time="2024-02-09T10:08:43.291022346Z" level=info msg="RemovePodSandbox for \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\"" Feb 9 10:08:43.291107 env[1146]: time="2024-02-09T10:08:43.291061508Z" level=info msg="Forcibly stopping sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\"" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.324 [WARNING][4319] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8xv4b-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"133f29c4-2add-444f-8ba7-b32a8c0bef25", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 7, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c68106694be9c0a6d9e18fa2c20166d56436a6de0c43cc3b026391190a531873", Pod:"coredns-5d78c9869d-8xv4b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid2443e8cadb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.324 [INFO][4319] k8s.go 578: Cleaning up netns ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.324 [INFO][4319] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" iface="eth0" netns="" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.324 [INFO][4319] k8s.go 585: Releasing IP address(es) ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.324 [INFO][4319] utils.go 188: Calico CNI releasing IP address ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.342 [INFO][4327] ipam_plugin.go 415: Releasing address using handleID ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.342 [INFO][4327] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.342 [INFO][4327] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.352 [WARNING][4327] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.352 [INFO][4327] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" HandleID="k8s-pod-network.9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Workload="localhost-k8s-coredns--5d78c9869d--8xv4b-eth0" Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.353 [INFO][4327] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:08:43.359675 env[1146]: 2024-02-09 10:08:43.357 [INFO][4319] k8s.go 591: Teardown processing complete. ContainerID="9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3" Feb 9 10:08:43.360220 env[1146]: time="2024-02-09T10:08:43.359699212Z" level=info msg="TearDown network for sandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" successfully" Feb 9 10:08:43.362502 env[1146]: time="2024-02-09T10:08:43.362460930Z" level=info msg="RemovePodSandbox \"9b1bdc57b4ebfeece39d950c935a297877e03fcf2e0641f916d0e2d6f5db4cf3\" returns successfully" Feb 9 10:08:43.428000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:43.428000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002591400 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:43.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:43.428000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:43.428000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027da8c0 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:43.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:43.428000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:43.428000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400247cce0 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:43.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:43.428000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:08:43.428000 audit[1901]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027da8e0 a2=fc6 a3=0 items=0 ppid=1742 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c629 key=(null) Feb 9 10:08:43.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:08:45.166791 systemd[1]: Started sshd@15-10.0.0.126:22-10.0.0.1:51812.service. Feb 9 10:08:45.169855 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 10:08:45.169932 kernel: audit: type=1130 audit(1707473325.166:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.126:22-10.0.0.1:51812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:45.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.126:22-10.0.0.1:51812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:45.208000 audit[4335]: USER_ACCT pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.208790 sshd[4335]: Accepted publickey for core from 10.0.0.1 port 51812 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:45.209870 sshd[4335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:45.209000 audit[4335]: CRED_ACQ pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.213171 kernel: audit: type=1101 audit(1707473325.208:1389): pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.213235 kernel: audit: type=1103 audit(1707473325.209:1390): pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.213270 kernel: audit: type=1006 audit(1707473325.209:1391): pid=4335 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 10:08:45.213940 systemd-logind[1132]: New session 16 of user core. Feb 9 10:08:45.209000 audit[4335]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcad49770 a2=3 a3=1 items=0 ppid=1 pid=4335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:45.214826 systemd[1]: Started session-16.scope. Feb 9 10:08:45.216806 kernel: audit: type=1300 audit(1707473325.209:1391): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcad49770 a2=3 a3=1 items=0 ppid=1 pid=4335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:45.216874 kernel: audit: type=1327 audit(1707473325.209:1391): proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:45.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:45.218000 audit[4335]: USER_START pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.219000 audit[4337]: CRED_ACQ pid=4337 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.223415 kernel: audit: type=1105 audit(1707473325.218:1392): pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.223460 kernel: audit: type=1103 audit(1707473325.219:1393): pid=4337 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.332774 sshd[4335]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:45.333000 audit[4335]: USER_END pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.336356 systemd[1]: Started sshd@16-10.0.0.126:22-10.0.0.1:51826.service. Feb 9 10:08:45.333000 audit[4335]: CRED_DISP pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.337630 systemd[1]: sshd@15-10.0.0.126:22-10.0.0.1:51812.service: Deactivated successfully. Feb 9 10:08:45.338560 kernel: audit: type=1106 audit(1707473325.333:1394): pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.338673 kernel: audit: type=1104 audit(1707473325.333:1395): pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.126:22-10.0.0.1:51826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:45.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.126:22-10.0.0.1:51812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:45.338310 systemd-logind[1132]: Session 16 logged out. Waiting for processes to exit. Feb 9 10:08:45.338335 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 10:08:45.339792 systemd-logind[1132]: Removed session 16. Feb 9 10:08:45.372000 audit[4347]: USER_ACCT pid=4347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.373171 sshd[4347]: Accepted publickey for core from 10.0.0.1 port 51826 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:45.374000 audit[4347]: CRED_ACQ pid=4347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.374000 audit[4347]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0094660 a2=3 a3=1 items=0 ppid=1 pid=4347 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:45.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:45.374589 sshd[4347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:45.378075 systemd-logind[1132]: New session 17 of user core. Feb 9 10:08:45.378506 systemd[1]: Started session-17.scope. Feb 9 10:08:45.381000 audit[4347]: USER_START pid=4347 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.382000 audit[4350]: CRED_ACQ pid=4350 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.611541 sshd[4347]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:45.614000 audit[4347]: USER_END pid=4347 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.614000 audit[4347]: CRED_DISP pid=4347 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.616921 systemd[1]: Started sshd@17-10.0.0.126:22-10.0.0.1:51834.service. Feb 9 10:08:45.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.126:22-10.0.0.1:51834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:45.621387 systemd[1]: sshd@16-10.0.0.126:22-10.0.0.1:51826.service: Deactivated successfully. Feb 9 10:08:45.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.126:22-10.0.0.1:51826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:45.622173 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 10:08:45.622820 systemd-logind[1132]: Session 17 logged out. Waiting for processes to exit. Feb 9 10:08:45.623528 systemd-logind[1132]: Removed session 17. Feb 9 10:08:45.657000 audit[4358]: USER_ACCT pid=4358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.657944 sshd[4358]: Accepted publickey for core from 10.0.0.1 port 51834 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:45.658000 audit[4358]: CRED_ACQ pid=4358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.658000 audit[4358]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc40453d0 a2=3 a3=1 items=0 ppid=1 pid=4358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:45.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:45.659039 sshd[4358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:45.662374 systemd-logind[1132]: New session 18 of user core. Feb 9 10:08:45.663495 systemd[1]: Started session-18.scope. Feb 9 10:08:45.666000 audit[4358]: USER_START pid=4358 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:45.667000 audit[4361]: CRED_ACQ pid=4361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.484000 audit[4375]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:46.484000 audit[4375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffd4bc39b0 a2=0 a3=ffff83f036c0 items=0 ppid=2184 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:46.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:46.485000 audit[4375]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:46.485000 audit[4375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd4bc39b0 a2=0 a3=ffff83f036c0 items=0 ppid=2184 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:46.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:46.503050 sshd[4358]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:46.504000 audit[4358]: USER_END pid=4358 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.504000 audit[4358]: CRED_DISP pid=4358 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.507087 systemd[1]: Started sshd@18-10.0.0.126:22-10.0.0.1:51844.service. Feb 9 10:08:46.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.126:22-10.0.0.1:51844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:46.507650 systemd[1]: sshd@17-10.0.0.126:22-10.0.0.1:51834.service: Deactivated successfully. Feb 9 10:08:46.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.126:22-10.0.0.1:51834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:46.508460 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 10:08:46.508993 systemd-logind[1132]: Session 18 logged out. Waiting for processes to exit. Feb 9 10:08:46.510257 systemd-logind[1132]: Removed session 18. Feb 9 10:08:46.510000 audit[4377]: NETFILTER_CFG table=filter:111 family=2 entries=32 op=nft_register_rule pid=4377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:46.510000 audit[4377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffff4fb2a50 a2=0 a3=ffff9a08b6c0 items=0 ppid=2184 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:46.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:46.511000 audit[4377]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:46.511000 audit[4377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff4fb2a50 a2=0 a3=ffff9a08b6c0 items=0 ppid=2184 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:46.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:46.547000 audit[4379]: USER_ACCT pid=4379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.547690 sshd[4379]: Accepted publickey for core from 10.0.0.1 port 51844 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:46.548000 audit[4379]: CRED_ACQ pid=4379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.548000 audit[4379]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffedaed540 a2=3 a3=1 items=0 ppid=1 pid=4379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:46.548000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:46.548882 sshd[4379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:46.552079 systemd-logind[1132]: New session 19 of user core. Feb 9 10:08:46.552962 systemd[1]: Started session-19.scope. Feb 9 10:08:46.556000 audit[4379]: USER_START pid=4379 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.557000 audit[4382]: CRED_ACQ pid=4382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.855654 sshd[4379]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:46.857000 audit[4379]: USER_END pid=4379 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.858216 systemd[1]: Started sshd@19-10.0.0.126:22-10.0.0.1:51860.service. Feb 9 10:08:46.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.126:22-10.0.0.1:51860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:46.858000 audit[4379]: CRED_DISP pid=4379 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.126:22-10.0.0.1:51844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:46.861240 systemd[1]: sshd@18-10.0.0.126:22-10.0.0.1:51844.service: Deactivated successfully. Feb 9 10:08:46.861973 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 10:08:46.863196 systemd-logind[1132]: Session 19 logged out. Waiting for processes to exit. Feb 9 10:08:46.865239 systemd-logind[1132]: Removed session 19. Feb 9 10:08:46.895000 audit[4390]: USER_ACCT pid=4390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.895569 sshd[4390]: Accepted publickey for core from 10.0.0.1 port 51860 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:46.896000 audit[4390]: CRED_ACQ pid=4390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.896000 audit[4390]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc765470 a2=3 a3=1 items=0 ppid=1 pid=4390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:46.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:46.896747 sshd[4390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:46.901121 systemd[1]: Started session-20.scope. Feb 9 10:08:46.901867 systemd-logind[1132]: New session 20 of user core. Feb 9 10:08:46.907000 audit[4390]: USER_START pid=4390 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:46.908000 audit[4393]: CRED_ACQ pid=4393 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:47.021768 sshd[4390]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:47.022000 audit[4390]: USER_END pid=4390 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:47.022000 audit[4390]: CRED_DISP pid=4390 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:47.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.126:22-10.0.0.1:51860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:47.024283 systemd[1]: sshd@19-10.0.0.126:22-10.0.0.1:51860.service: Deactivated successfully. Feb 9 10:08:47.025006 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 10:08:47.026303 systemd-logind[1132]: Session 20 logged out. Waiting for processes to exit. Feb 9 10:08:47.027048 systemd-logind[1132]: Removed session 20. Feb 9 10:08:50.297418 systemd[1]: run-containerd-runc-k8s.io-fe01d669a1aa0f151a868ee1e3d5587e437307c9a9fad775d2b0bad033a0249d-runc.b3S4mB.mount: Deactivated successfully. Feb 9 10:08:51.291000 audit[4429]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:51.293509 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 10:08:51.293718 kernel: audit: type=1325 audit(1707473331.291:1437): table=filter:113 family=2 entries=20 op=nft_register_rule pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:51.293770 kernel: audit: type=1300 audit(1707473331.291:1437): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff1cb9e20 a2=0 a3=ffff93b736c0 items=0 ppid=2184 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:51.291000 audit[4429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff1cb9e20 a2=0 a3=ffff93b736c0 items=0 ppid=2184 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:51.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:51.297930 kernel: audit: type=1327 audit(1707473331.291:1437): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:51.299000 audit[4429]: NETFILTER_CFG table=nat:114 family=2 entries=104 op=nft_register_chain pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:51.299000 audit[4429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=fffff1cb9e20 a2=0 a3=ffff93b736c0 items=0 ppid=2184 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:51.306953 kernel: audit: type=1325 audit(1707473331.299:1438): table=nat:114 family=2 entries=104 op=nft_register_chain pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:08:51.307023 kernel: audit: type=1300 audit(1707473331.299:1438): arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=fffff1cb9e20 a2=0 a3=ffff93b736c0 items=0 ppid=2184 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:51.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:51.308489 kernel: audit: type=1327 audit(1707473331.299:1438): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:08:52.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.126:22-10.0.0.1:51866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:52.026667 systemd[1]: Started sshd@20-10.0.0.126:22-10.0.0.1:51866.service. Feb 9 10:08:52.029268 kernel: audit: type=1130 audit(1707473332.026:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.126:22-10.0.0.1:51866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:52.063000 audit[4432]: USER_ACCT pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.063834 sshd[4432]: Accepted publickey for core from 10.0.0.1 port 51866 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:52.064932 sshd[4432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:52.064000 audit[4432]: CRED_ACQ pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.068611 kernel: audit: type=1101 audit(1707473332.063:1440): pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.068675 kernel: audit: type=1103 audit(1707473332.064:1441): pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.068698 kernel: audit: type=1006 audit(1707473332.064:1442): pid=4432 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 10:08:52.068202 systemd-logind[1132]: New session 21 of user core. Feb 9 10:08:52.069090 systemd[1]: Started session-21.scope. Feb 9 10:08:52.064000 audit[4432]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff00f30f0 a2=3 a3=1 items=0 ppid=1 pid=4432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:52.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:52.072000 audit[4432]: USER_START pid=4432 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.073000 audit[4434]: CRED_ACQ pid=4434 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.177366 sshd[4432]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:52.178000 audit[4432]: USER_END pid=4432 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.178000 audit[4432]: CRED_DISP pid=4432 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:52.179840 systemd[1]: sshd@20-10.0.0.126:22-10.0.0.1:51866.service: Deactivated successfully. Feb 9 10:08:52.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.126:22-10.0.0.1:51866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:52.180611 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 10:08:52.181135 systemd-logind[1132]: Session 21 logged out. Waiting for processes to exit. Feb 9 10:08:52.181804 systemd-logind[1132]: Removed session 21. Feb 9 10:08:57.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.126:22-10.0.0.1:34864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:57.182460 systemd[1]: Started sshd@21-10.0.0.126:22-10.0.0.1:34864.service. Feb 9 10:08:57.185127 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:08:57.185202 kernel: audit: type=1130 audit(1707473337.182:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.126:22-10.0.0.1:34864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:08:57.240000 audit[4464]: USER_ACCT pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.240735 sshd[4464]: Accepted publickey for core from 10.0.0.1 port 34864 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:08:57.241786 sshd[4464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:08:57.241000 audit[4464]: CRED_ACQ pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.245224 kernel: audit: type=1101 audit(1707473337.240:1449): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.245309 kernel: audit: type=1103 audit(1707473337.241:1450): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.245332 kernel: audit: type=1006 audit(1707473337.241:1451): pid=4464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 10:08:57.246736 kernel: audit: type=1300 audit(1707473337.241:1451): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccd87350 a2=3 a3=1 items=0 ppid=1 pid=4464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:57.241000 audit[4464]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccd87350 a2=3 a3=1 items=0 ppid=1 pid=4464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:08:57.246429 systemd[1]: Started session-22.scope. Feb 9 10:08:57.246901 systemd-logind[1132]: New session 22 of user core. Feb 9 10:08:57.248828 kernel: audit: type=1327 audit(1707473337.241:1451): proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:57.241000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:08:57.251000 audit[4464]: USER_START pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.252000 audit[4466]: CRED_ACQ pid=4466 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.256265 kernel: audit: type=1105 audit(1707473337.251:1452): pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.256299 kernel: audit: type=1103 audit(1707473337.252:1453): pid=4466 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.356574 sshd[4464]: pam_unix(sshd:session): session closed for user core Feb 9 10:08:57.357000 audit[4464]: USER_END pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.359162 systemd[1]: sshd@21-10.0.0.126:22-10.0.0.1:34864.service: Deactivated successfully. Feb 9 10:08:57.359953 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 10:08:57.357000 audit[4464]: CRED_DISP pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.360524 systemd-logind[1132]: Session 22 logged out. Waiting for processes to exit. Feb 9 10:08:57.361191 systemd-logind[1132]: Removed session 22. Feb 9 10:08:57.362085 kernel: audit: type=1106 audit(1707473337.357:1454): pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.362186 kernel: audit: type=1104 audit(1707473337.357:1455): pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:08:57.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.126:22-10.0.0.1:34864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:01.431269 kubelet[2015]: I0209 10:09:01.431211 2015 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:09:01.436571 systemd[1]: Created slice kubepods-besteffort-pod5882e6d8_df1c_4724_9889_91ac4abf2169.slice. Feb 9 10:09:01.449000 audit[4487]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:01.449000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc1db67e0 a2=0 a3=ffffa65916c0 items=0 ppid=2184 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:01.450000 audit[4487]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:01.450000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffc1db67e0 a2=0 a3=ffffa65916c0 items=0 ppid=2184 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:01.460000 audit[4489]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:01.460000 audit[4489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffce84e700 a2=0 a3=ffff9981a6c0 items=0 ppid=2184 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:01.462000 audit[4489]: NETFILTER_CFG table=nat:118 family=2 entries=44 op=nft_register_rule pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:01.462000 audit[4489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffce84e700 a2=0 a3=ffff9981a6c0 items=0 ppid=2184 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:01.519176 kubelet[2015]: I0209 10:09:01.519133 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5882e6d8-df1c-4724-9889-91ac4abf2169-calico-apiserver-certs\") pod \"calico-apiserver-58cc4975f9-vks84\" (UID: \"5882e6d8-df1c-4724-9889-91ac4abf2169\") " pod="calico-apiserver/calico-apiserver-58cc4975f9-vks84" Feb 9 10:09:01.519176 kubelet[2015]: I0209 10:09:01.519183 2015 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrmtj\" (UniqueName: \"kubernetes.io/projected/5882e6d8-df1c-4724-9889-91ac4abf2169-kube-api-access-vrmtj\") pod \"calico-apiserver-58cc4975f9-vks84\" (UID: \"5882e6d8-df1c-4724-9889-91ac4abf2169\") " pod="calico-apiserver/calico-apiserver-58cc4975f9-vks84" Feb 9 10:09:01.730221 kubelet[2015]: E0209 10:09:01.730190 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:09:01.738849 env[1146]: time="2024-02-09T10:09:01.738781074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58cc4975f9-vks84,Uid:5882e6d8-df1c-4724-9889-91ac4abf2169,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:09:01.856284 systemd-networkd[1047]: calic521c2eda71: Link UP Feb 9 10:09:01.857656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:09:01.857738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic521c2eda71: link becomes ready Feb 9 10:09:01.857841 systemd-networkd[1047]: calic521c2eda71: Gained carrier Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.782 [INFO][4493] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0 calico-apiserver-58cc4975f9- calico-apiserver 5882e6d8-df1c-4724-9889-91ac4abf2169 1116 0 2024-02-09 10:09:01 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58cc4975f9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-58cc4975f9-vks84 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic521c2eda71 [] []}} ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.782 [INFO][4493] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.806 [INFO][4506] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" HandleID="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Workload="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.822 [INFO][4506] ipam_plugin.go 268: Auto assigning IP ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" HandleID="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Workload="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029d6d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-58cc4975f9-vks84", "timestamp":"2024-02-09 10:09:01.806134794 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.822 [INFO][4506] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.822 [INFO][4506] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.822 [INFO][4506] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.824 [INFO][4506] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.828 [INFO][4506] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.833 [INFO][4506] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.835 [INFO][4506] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.837 [INFO][4506] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.837 [INFO][4506] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.840 [INFO][4506] ipam.go 1682: Creating new handle: k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7 Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.846 [INFO][4506] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.851 [INFO][4506] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.851 [INFO][4506] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" host="localhost" Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.851 [INFO][4506] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:09:01.869280 env[1146]: 2024-02-09 10:09:01.851 [INFO][4506] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" HandleID="k8s-pod-network.872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Workload="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.869838 env[1146]: 2024-02-09 10:09:01.853 [INFO][4493] k8s.go 385: Populated endpoint ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0", GenerateName:"calico-apiserver-58cc4975f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"5882e6d8-df1c-4724-9889-91ac4abf2169", ResourceVersion:"1116", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 9, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58cc4975f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-58cc4975f9-vks84", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic521c2eda71", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:09:01.869838 env[1146]: 2024-02-09 10:09:01.853 [INFO][4493] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.869838 env[1146]: 2024-02-09 10:09:01.853 [INFO][4493] dataplane_linux.go 68: Setting the host side veth name to calic521c2eda71 ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.869838 env[1146]: 2024-02-09 10:09:01.856 [INFO][4493] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.869838 env[1146]: 2024-02-09 10:09:01.858 [INFO][4493] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0", GenerateName:"calico-apiserver-58cc4975f9-", Namespace:"calico-apiserver", SelfLink:"", UID:"5882e6d8-df1c-4724-9889-91ac4abf2169", ResourceVersion:"1116", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 9, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58cc4975f9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7", Pod:"calico-apiserver-58cc4975f9-vks84", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic521c2eda71", MAC:"d2:30:6c:68:c5:d2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:09:01.869838 env[1146]: 2024-02-09 10:09:01.866 [INFO][4493] k8s.go 491: Wrote updated endpoint to datastore ContainerID="872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7" Namespace="calico-apiserver" Pod="calico-apiserver-58cc4975f9-vks84" WorkloadEndpoint="localhost-k8s-calico--apiserver--58cc4975f9--vks84-eth0" Feb 9 10:09:01.882809 env[1146]: time="2024-02-09T10:09:01.882737196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:09:01.883004 env[1146]: time="2024-02-09T10:09:01.882978995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:09:01.883098 env[1146]: time="2024-02-09T10:09:01.883077514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:09:01.883395 env[1146]: time="2024-02-09T10:09:01.883364313Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7 pid=4540 runtime=io.containerd.runc.v2 Feb 9 10:09:01.893000 audit[4557]: NETFILTER_CFG table=filter:119 family=2 entries=59 op=nft_register_chain pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:09:01.893000 audit[4557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffd05cb390 a2=0 a3=ffffbd1dffa8 items=0 ppid=3042 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.893000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:09:01.898431 systemd[1]: Started cri-containerd-872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7.scope. Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.918000 audit: BPF prog-id=182 op=LOAD Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4540 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837326230313234333162663330646333386434373233643833386239 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4540 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837326230313234333162663330646333386434373233643833386239 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.919000 audit: BPF prog-id=183 op=LOAD Feb 9 10:09:01.919000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4540 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837326230313234333162663330646333386434373233643833386239 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.920000 audit: BPF prog-id=184 op=LOAD Feb 9 10:09:01.920000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4540 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837326230313234333162663330646333386434373233643833386239 Feb 9 10:09:01.920000 audit: BPF prog-id=184 op=UNLOAD Feb 9 10:09:01.921000 audit: BPF prog-id=183 op=UNLOAD Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:01.921000 audit: BPF prog-id=185 op=LOAD Feb 9 10:09:01.921000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4540 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:01.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837326230313234333162663330646333386434373233643833386239 Feb 9 10:09:01.922441 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:09:01.941745 env[1146]: time="2024-02-09T10:09:01.941705470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58cc4975f9-vks84,Uid:5882e6d8-df1c-4724-9889-91ac4abf2169,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7\"" Feb 9 10:09:01.943432 env[1146]: time="2024-02-09T10:09:01.943390423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:09:02.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.126:22-10.0.0.1:34872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:02.361112 systemd[1]: Started sshd@22-10.0.0.126:22-10.0.0.1:34872.service. Feb 9 10:09:02.363995 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 10:09:02.364068 kernel: audit: type=1130 audit(1707473342.361:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.126:22-10.0.0.1:34872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:02.397000 audit[4576]: USER_ACCT pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.397837 sshd[4576]: Accepted publickey for core from 10.0.0.1 port 34872 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:09:02.399087 sshd[4576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:02.398000 audit[4576]: CRED_ACQ pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.402659 kernel: audit: type=1101 audit(1707473342.397:1481): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.402736 kernel: audit: type=1103 audit(1707473342.398:1482): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.402756 kernel: audit: type=1006 audit(1707473342.398:1483): pid=4576 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 10:09:02.403869 systemd[1]: Started session-23.scope. Feb 9 10:09:02.404142 kernel: audit: type=1300 audit(1707473342.398:1483): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe38d5260 a2=3 a3=1 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:02.398000 audit[4576]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe38d5260 a2=3 a3=1 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:02.404170 systemd-logind[1132]: New session 23 of user core. Feb 9 10:09:02.407358 kernel: audit: type=1327 audit(1707473342.398:1483): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:02.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:02.411000 audit[4576]: USER_START pid=4576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.412000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.416714 kernel: audit: type=1105 audit(1707473342.411:1484): pid=4576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.416760 kernel: audit: type=1103 audit(1707473342.412:1485): pid=4578 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.518619 sshd[4576]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:02.522262 kernel: audit: type=1106 audit(1707473342.519:1486): pid=4576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.522348 kernel: audit: type=1104 audit(1707473342.519:1487): pid=4576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.519000 audit[4576]: USER_END pid=4576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.519000 audit[4576]: CRED_DISP pid=4576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:02.521146 systemd[1]: sshd@22-10.0.0.126:22-10.0.0.1:34872.service: Deactivated successfully. Feb 9 10:09:02.521890 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:09:02.523977 systemd-logind[1132]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:09:02.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.126:22-10.0.0.1:34872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:02.524729 systemd-logind[1132]: Removed session 23. Feb 9 10:09:02.732095 kubelet[2015]: E0209 10:09:02.732055 2015 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:09:02.970118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1667025017.mount: Deactivated successfully. Feb 9 10:09:02.982443 systemd-networkd[1047]: calic521c2eda71: Gained IPv6LL Feb 9 10:09:04.173728 env[1146]: time="2024-02-09T10:09:04.173683638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:09:04.175895 env[1146]: time="2024-02-09T10:09:04.175852876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:09:04.177703 env[1146]: time="2024-02-09T10:09:04.177679234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:09:04.179442 env[1146]: time="2024-02-09T10:09:04.179415512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:09:04.179955 env[1146]: time="2024-02-09T10:09:04.179920351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:09:04.182170 env[1146]: time="2024-02-09T10:09:04.182136389Z" level=info msg="CreateContainer within sandbox \"872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:09:04.290177 env[1146]: time="2024-02-09T10:09:04.289994554Z" level=info msg="CreateContainer within sandbox \"872b012431bf30dc38d4723d838b9280a907a202194878696fb17d008fc655e7\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"12ef09f6c61069bb43fb2ebecc57b4543de6426370200ee53e51f90e41f45cf9\"" Feb 9 10:09:04.291750 env[1146]: time="2024-02-09T10:09:04.290626433Z" level=info msg="StartContainer for \"12ef09f6c61069bb43fb2ebecc57b4543de6426370200ee53e51f90e41f45cf9\"" Feb 9 10:09:04.309470 systemd[1]: Started cri-containerd-12ef09f6c61069bb43fb2ebecc57b4543de6426370200ee53e51f90e41f45cf9.scope. Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.341000 audit: BPF prog-id=186 op=LOAD Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4540 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:04.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656630396636633631303639626234336662326562656363353762 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4540 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:04.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656630396636633631303639626234336662326562656363353762 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit: BPF prog-id=187 op=LOAD Feb 9 10:09:04.342000 audit[4595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4540 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:04.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656630396636633631303639626234336662326562656363353762 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit: BPF prog-id=188 op=LOAD Feb 9 10:09:04.342000 audit[4595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4540 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:04.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656630396636633631303639626234336662326562656363353762 Feb 9 10:09:04.342000 audit: BPF prog-id=188 op=UNLOAD Feb 9 10:09:04.342000 audit: BPF prog-id=187 op=UNLOAD Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { perfmon } for pid=4595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit[4595]: AVC avc: denied { bpf } for pid=4595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:09:04.342000 audit: BPF prog-id=189 op=LOAD Feb 9 10:09:04.342000 audit[4595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4540 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:04.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656630396636633631303639626234336662326562656363353762 Feb 9 10:09:04.367459 env[1146]: time="2024-02-09T10:09:04.367412671Z" level=info msg="StartContainer for \"12ef09f6c61069bb43fb2ebecc57b4543de6426370200ee53e51f90e41f45cf9\" returns successfully" Feb 9 10:09:05.015000 audit[4629]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:05.015000 audit[4629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcfb74d30 a2=0 a3=ffffad01c6c0 items=0 ppid=2184 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:05.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:05.017000 audit[4629]: NETFILTER_CFG table=nat:121 family=2 entries=44 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:05.017000 audit[4629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffcfb74d30 a2=0 a3=ffffad01c6c0 items=0 ppid=2184 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:05.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:05.216000 audit[4607]: AVC avc: denied { watch } for pid=4607 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_09_01.1223754034/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c164,c860 tclass=file permissive=0 Feb 9 10:09:05.216000 audit[4607]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bcf6a0 a2=fc6 a3=0 items=0 ppid=4540 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c860 key=(null) Feb 9 10:09:05.216000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:09:05.335000 audit[4631]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:05.335000 audit[4631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd14a9a0 a2=0 a3=ffff807206c0 items=0 ppid=2184 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:05.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:05.337000 audit[4631]: NETFILTER_CFG table=nat:123 family=2 entries=44 op=nft_register_rule pid=4631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:09:05.337000 audit[4631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffcd14a9a0 a2=0 a3=ffff807206c0 items=0 ppid=2184 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:05.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:09:07.524567 systemd[1]: Started sshd@23-10.0.0.126:22-10.0.0.1:48406.service. Feb 9 10:09:07.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.126:22-10.0.0.1:48406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:07.525443 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 10:09:07.525542 kernel: audit: type=1130 audit(1707473347.524:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.126:22-10.0.0.1:48406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:09:07.566000 audit[4635]: USER_ACCT pid=4635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.566977 sshd[4635]: Accepted publickey for core from 10.0.0.1 port 48406 ssh2: RSA SHA256:g0U6KM199woo3jVvTXJmbHJGWRxGxX9UCqO141QChXg Feb 9 10:09:07.567000 audit[4635]: CRED_ACQ pid=4635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.569528 sshd[4635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:09:07.571542 kernel: audit: type=1101 audit(1707473347.566:1513): pid=4635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.571629 kernel: audit: type=1103 audit(1707473347.567:1514): pid=4635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.571664 kernel: audit: type=1006 audit(1707473347.567:1515): pid=4635 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 10:09:07.572773 kernel: audit: type=1300 audit(1707473347.567:1515): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc35a2280 a2=3 a3=1 items=0 ppid=1 pid=4635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:07.567000 audit[4635]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc35a2280 a2=3 a3=1 items=0 ppid=1 pid=4635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:09:07.573595 systemd-logind[1132]: New session 24 of user core. Feb 9 10:09:07.574015 systemd[1]: Started session-24.scope. Feb 9 10:09:07.575127 kernel: audit: type=1327 audit(1707473347.567:1515): proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:07.567000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:09:07.578000 audit[4635]: USER_START pid=4635 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.579000 audit[4637]: CRED_ACQ pid=4637 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.583734 kernel: audit: type=1105 audit(1707473347.578:1516): pid=4635 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.583795 kernel: audit: type=1103 audit(1707473347.579:1517): pid=4637 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.702892 sshd[4635]: pam_unix(sshd:session): session closed for user core Feb 9 10:09:07.703000 audit[4635]: USER_END pid=4635 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.705559 systemd[1]: sshd@23-10.0.0.126:22-10.0.0.1:48406.service: Deactivated successfully. Feb 9 10:09:07.706350 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:09:07.703000 audit[4635]: CRED_DISP pid=4635 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.707045 systemd-logind[1132]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:09:07.707942 systemd-logind[1132]: Removed session 24. Feb 9 10:09:07.708638 kernel: audit: type=1106 audit(1707473347.703:1518): pid=4635 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.708713 kernel: audit: type=1104 audit(1707473347.703:1519): pid=4635 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:09:07.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.126:22-10.0.0.1:48406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'