Feb 9 10:26:26.717167 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 10:26:26.717186 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:26:26.717194 kernel: efi: EFI v2.70 by EDK II Feb 9 10:26:26.717199 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 9 10:26:26.717204 kernel: random: crng init done Feb 9 10:26:26.717210 kernel: ACPI: Early table checksum verification disabled Feb 9 10:26:26.717216 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 9 10:26:26.717222 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 9 10:26:26.717228 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717233 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717238 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717243 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717249 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717254 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717261 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717267 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717273 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 10:26:26.717279 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 9 10:26:26.717285 kernel: NUMA: Failed to initialise from firmware Feb 9 10:26:26.717291 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:26:26.717296 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] Feb 9 10:26:26.717302 kernel: Zone ranges: Feb 9 10:26:26.717308 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:26:26.717315 kernel: DMA32 empty Feb 9 10:26:26.717320 kernel: Normal empty Feb 9 10:26:26.717326 kernel: Movable zone start for each node Feb 9 10:26:26.717332 kernel: Early memory node ranges Feb 9 10:26:26.717337 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 9 10:26:26.717343 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 9 10:26:26.717358 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 9 10:26:26.717365 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 9 10:26:26.717371 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 9 10:26:26.717376 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 9 10:26:26.717382 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 9 10:26:26.717387 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 9 10:26:26.717395 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 9 10:26:26.717404 kernel: psci: probing for conduit method from ACPI. Feb 9 10:26:26.717410 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 10:26:26.717415 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:26:26.717421 kernel: psci: Trusted OS migration not required Feb 9 10:26:26.717429 kernel: psci: SMC Calling Convention v1.1 Feb 9 10:26:26.717436 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 9 10:26:26.717443 kernel: ACPI: SRAT not present Feb 9 10:26:26.717449 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:26:26.717455 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:26:26.717461 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 9 10:26:26.717467 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:26:26.717473 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:26:26.717479 kernel: CPU features: detected: Hardware dirty bit management Feb 9 10:26:26.717485 kernel: CPU features: detected: Spectre-v4 Feb 9 10:26:26.717491 kernel: CPU features: detected: Spectre-BHB Feb 9 10:26:26.717498 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:26:26.717504 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:26:26.717510 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 10:26:26.717516 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 9 10:26:26.717522 kernel: Policy zone: DMA Feb 9 10:26:26.717531 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:26:26.717538 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:26:26.717544 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:26:26.717550 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:26:26.717556 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:26:26.717562 kernel: Memory: 2459144K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113144K reserved, 0K cma-reserved) Feb 9 10:26:26.717570 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 10:26:26.717578 kernel: trace event string verifier disabled Feb 9 10:26:26.717584 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:26:26.717590 kernel: rcu: RCU event tracing is enabled. Feb 9 10:26:26.717596 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 10:26:26.717603 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:26:26.717609 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:26:26.717617 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:26:26.717623 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 10:26:26.717629 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:26:26.717635 kernel: GICv3: 256 SPIs implemented Feb 9 10:26:26.717642 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:26:26.717648 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:26:26.717656 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:26:26.717662 kernel: GICv3: 16 PPIs implemented Feb 9 10:26:26.717668 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 9 10:26:26.717674 kernel: ACPI: SRAT not present Feb 9 10:26:26.717680 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 9 10:26:26.717688 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 10:26:26.717695 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 9 10:26:26.717701 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 9 10:26:26.717707 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 9 10:26:26.717713 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:26:26.717720 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 10:26:26.717726 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 10:26:26.717733 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 10:26:26.717739 kernel: arm-pv: using stolen time PV Feb 9 10:26:26.717745 kernel: Console: colour dummy device 80x25 Feb 9 10:26:26.717752 kernel: ACPI: Core revision 20210730 Feb 9 10:26:26.717760 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 10:26:26.717767 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:26:26.717773 kernel: LSM: Security Framework initializing Feb 9 10:26:26.717779 kernel: SELinux: Initializing. Feb 9 10:26:26.717786 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:26:26.717793 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:26:26.717799 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:26:26.717805 kernel: Platform MSI: ITS@0x8080000 domain created Feb 9 10:26:26.717811 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 9 10:26:26.717817 kernel: Remapping and enabling EFI services. Feb 9 10:26:26.717823 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:26:26.717830 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:26:26.717838 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 9 10:26:26.717845 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 9 10:26:26.717852 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:26:26.717858 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 10:26:26.717864 kernel: Detected PIPT I-cache on CPU2 Feb 9 10:26:26.717870 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 9 10:26:26.717877 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 9 10:26:26.717883 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:26:26.717889 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 9 10:26:26.717897 kernel: Detected PIPT I-cache on CPU3 Feb 9 10:26:26.717903 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 9 10:26:26.717910 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 9 10:26:26.717916 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:26:26.717922 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 9 10:26:26.717929 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 10:26:26.717938 kernel: SMP: Total of 4 processors activated. Feb 9 10:26:26.717952 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:26:26.717958 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 10:26:26.717967 kernel: CPU features: detected: Common not Private translations Feb 9 10:26:26.717973 kernel: CPU features: detected: CRC32 instructions Feb 9 10:26:26.717980 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 10:26:26.717986 kernel: CPU features: detected: LSE atomic instructions Feb 9 10:26:26.717995 kernel: CPU features: detected: Privileged Access Never Feb 9 10:26:26.718002 kernel: CPU features: detected: RAS Extension Support Feb 9 10:26:26.718009 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 9 10:26:26.718015 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:26:26.718024 kernel: alternatives: patching kernel code Feb 9 10:26:26.718031 kernel: devtmpfs: initialized Feb 9 10:26:26.718038 kernel: KASLR enabled Feb 9 10:26:26.718045 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:26:26.718053 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 10:26:26.718060 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:26:26.718067 kernel: SMBIOS 3.0.0 present. Feb 9 10:26:26.718073 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 9 10:26:26.718082 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:26:26.718088 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:26:26.718095 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:26:26.718105 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:26:26.718111 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:26:26.718118 kernel: audit: type=2000 audit(0.034:1): state=initialized audit_enabled=0 res=1 Feb 9 10:26:26.718124 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:26:26.718131 kernel: cpuidle: using governor menu Feb 9 10:26:26.718137 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:26:26.718146 kernel: ASID allocator initialised with 32768 entries Feb 9 10:26:26.718152 kernel: ACPI: bus type PCI registered Feb 9 10:26:26.718159 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:26:26.718166 kernel: Serial: AMBA PL011 UART driver Feb 9 10:26:26.718173 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:26:26.718181 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:26:26.718188 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:26:26.718194 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:26:26.718201 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:26:26.718207 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:26:26.718220 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:26:26.718227 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:26:26.718234 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:26:26.718243 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:26:26.718250 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:26:26.718256 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:26:26.718265 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:26:26.718272 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:26:26.718278 kernel: ACPI: Interpreter enabled Feb 9 10:26:26.718285 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:26:26.718293 kernel: ACPI: MCFG table detected, 1 entries Feb 9 10:26:26.718301 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 9 10:26:26.718308 kernel: printk: console [ttyAMA0] enabled Feb 9 10:26:26.718315 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 10:26:26.718455 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 10:26:26.718520 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 10:26:26.718579 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 10:26:26.718638 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 9 10:26:26.718698 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 9 10:26:26.718707 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 9 10:26:26.718714 kernel: PCI host bridge to bus 0000:00 Feb 9 10:26:26.718778 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 9 10:26:26.718831 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 10:26:26.718885 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 9 10:26:26.718937 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 10:26:26.719017 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 9 10:26:26.719084 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 10:26:26.719144 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 9 10:26:26.719226 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 9 10:26:26.719293 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 10:26:26.719364 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 9 10:26:26.719424 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 9 10:26:26.719486 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 9 10:26:26.719539 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 9 10:26:26.719590 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 10:26:26.719642 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 9 10:26:26.719651 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 10:26:26.719658 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 10:26:26.719664 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 10:26:26.719672 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 10:26:26.719679 kernel: iommu: Default domain type: Translated Feb 9 10:26:26.719685 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:26:26.719692 kernel: vgaarb: loaded Feb 9 10:26:26.719698 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:26:26.719705 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:26:26.719712 kernel: PTP clock support registered Feb 9 10:26:26.719718 kernel: Registered efivars operations Feb 9 10:26:26.719725 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:26:26.719731 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:26:26.719739 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:26:26.719746 kernel: pnp: PnP ACPI init Feb 9 10:26:26.719812 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 9 10:26:26.719822 kernel: pnp: PnP ACPI: found 1 devices Feb 9 10:26:26.719828 kernel: NET: Registered PF_INET protocol family Feb 9 10:26:26.719835 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:26:26.719842 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:26:26.719848 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:26:26.719857 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:26:26.719863 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:26:26.719870 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:26:26.719876 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:26:26.719883 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:26:26.719890 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:26:26.719896 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:26:26.719903 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 9 10:26:26.719911 kernel: kvm [1]: HYP mode not available Feb 9 10:26:26.719917 kernel: Initialise system trusted keyrings Feb 9 10:26:26.719924 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:26:26.721703 kernel: Key type asymmetric registered Feb 9 10:26:26.721711 kernel: Asymmetric key parser 'x509' registered Feb 9 10:26:26.721717 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:26:26.721724 kernel: io scheduler mq-deadline registered Feb 9 10:26:26.721730 kernel: io scheduler kyber registered Feb 9 10:26:26.721737 kernel: io scheduler bfq registered Feb 9 10:26:26.721743 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 10:26:26.721753 kernel: ACPI: button: Power Button [PWRB] Feb 9 10:26:26.721760 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 10:26:26.721846 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 9 10:26:26.721856 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:26:26.721863 kernel: thunder_xcv, ver 1.0 Feb 9 10:26:26.721869 kernel: thunder_bgx, ver 1.0 Feb 9 10:26:26.721876 kernel: nicpf, ver 1.0 Feb 9 10:26:26.721882 kernel: nicvf, ver 1.0 Feb 9 10:26:26.721964 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:26:26.722026 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:26:26 UTC (1707474386) Feb 9 10:26:26.722035 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:26:26.722041 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:26:26.722048 kernel: Segment Routing with IPv6 Feb 9 10:26:26.722055 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:26:26.722061 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:26:26.722068 kernel: Key type dns_resolver registered Feb 9 10:26:26.722074 kernel: registered taskstats version 1 Feb 9 10:26:26.722082 kernel: Loading compiled-in X.509 certificates Feb 9 10:26:26.722089 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:26:26.722096 kernel: Key type .fscrypt registered Feb 9 10:26:26.722102 kernel: Key type fscrypt-provisioning registered Feb 9 10:26:26.722108 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:26:26.722115 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:26:26.722121 kernel: ima: No architecture policies found Feb 9 10:26:26.722128 kernel: Freeing unused kernel memory: 34688K Feb 9 10:26:26.722134 kernel: Run /init as init process Feb 9 10:26:26.722142 kernel: with arguments: Feb 9 10:26:26.722148 kernel: /init Feb 9 10:26:26.722155 kernel: with environment: Feb 9 10:26:26.722161 kernel: HOME=/ Feb 9 10:26:26.722167 kernel: TERM=linux Feb 9 10:26:26.722174 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:26:26.722187 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:26:26.722196 systemd[1]: Detected virtualization kvm. Feb 9 10:26:26.722209 systemd[1]: Detected architecture arm64. Feb 9 10:26:26.722218 systemd[1]: Running in initrd. Feb 9 10:26:26.722225 systemd[1]: No hostname configured, using default hostname. Feb 9 10:26:26.722232 systemd[1]: Hostname set to . Feb 9 10:26:26.722240 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:26:26.722246 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:26:26.722253 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:26:26.722260 systemd[1]: Reached target cryptsetup.target. Feb 9 10:26:26.722268 systemd[1]: Reached target paths.target. Feb 9 10:26:26.722275 systemd[1]: Reached target slices.target. Feb 9 10:26:26.722281 systemd[1]: Reached target swap.target. Feb 9 10:26:26.722288 systemd[1]: Reached target timers.target. Feb 9 10:26:26.722296 systemd[1]: Listening on iscsid.socket. Feb 9 10:26:26.722303 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:26:26.722309 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:26:26.722318 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:26:26.722325 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:26:26.722332 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:26:26.722338 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:26:26.722345 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:26:26.722392 systemd[1]: Reached target sockets.target. Feb 9 10:26:26.722399 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:26:26.722406 systemd[1]: Finished network-cleanup.service. Feb 9 10:26:26.722413 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:26:26.722422 systemd[1]: Starting systemd-journald.service... Feb 9 10:26:26.722429 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:26:26.722435 systemd[1]: Starting systemd-resolved.service... Feb 9 10:26:26.722442 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:26:26.722449 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:26:26.722456 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:26:26.722463 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:26:26.722470 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:26:26.722477 kernel: audit: type=1130 audit(1707474386.719:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.722485 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:26:26.722495 systemd-journald[289]: Journal started Feb 9 10:26:26.722536 systemd-journald[289]: Runtime Journal (/run/log/journal/f3ef765572e84a369979bb8ae380697f) is 6.0M, max 48.7M, 42.6M free. Feb 9 10:26:26.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.712444 systemd-modules-load[290]: Inserted module 'overlay' Feb 9 10:26:26.724146 systemd[1]: Started systemd-journald.service. Feb 9 10:26:26.726380 kernel: audit: type=1130 audit(1707474386.722:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.728130 kernel: audit: type=1130 audit(1707474386.726:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.728148 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:26:26.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.727258 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:26:26.728412 systemd-resolved[291]: Positive Trust Anchors: Feb 9 10:26:26.728418 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:26:26.728445 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:26:26.736540 kernel: Bridge firewalling registered Feb 9 10:26:26.732499 systemd-modules-load[290]: Inserted module 'br_netfilter' Feb 9 10:26:26.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.733021 systemd-resolved[291]: Defaulting to hostname 'linux'. Feb 9 10:26:26.740498 kernel: audit: type=1130 audit(1707474386.736:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.733736 systemd[1]: Started systemd-resolved.service. Feb 9 10:26:26.737092 systemd[1]: Reached target nss-lookup.target. Feb 9 10:26:26.745365 kernel: SCSI subsystem initialized Feb 9 10:26:26.747896 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:26:26.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.749233 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:26:26.754252 kernel: audit: type=1130 audit(1707474386.748:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.754268 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:26:26.754278 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:26:26.754286 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:26:26.756391 systemd-modules-load[290]: Inserted module 'dm_multipath' Feb 9 10:26:26.757234 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:26:26.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.759132 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:26:26.760772 kernel: audit: type=1130 audit(1707474386.758:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.761663 dracut-cmdline[306]: dracut-dracut-053 Feb 9 10:26:26.763801 dracut-cmdline[306]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:26:26.767791 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:26:26.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.771378 kernel: audit: type=1130 audit(1707474386.768:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.819370 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:26:26.827366 kernel: iscsi: registered transport (tcp) Feb 9 10:26:26.842375 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:26:26.842402 kernel: QLogic iSCSI HBA Driver Feb 9 10:26:26.874812 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:26:26.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.876205 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:26:26.878821 kernel: audit: type=1130 audit(1707474386.875:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:26.919364 kernel: raid6: neonx8 gen() 13766 MB/s Feb 9 10:26:26.936365 kernel: raid6: neonx8 xor() 10801 MB/s Feb 9 10:26:26.953359 kernel: raid6: neonx4 gen() 13479 MB/s Feb 9 10:26:26.970366 kernel: raid6: neonx4 xor() 11260 MB/s Feb 9 10:26:26.987358 kernel: raid6: neonx2 gen() 12918 MB/s Feb 9 10:26:27.004360 kernel: raid6: neonx2 xor() 10255 MB/s Feb 9 10:26:27.021359 kernel: raid6: neonx1 gen() 10410 MB/s Feb 9 10:26:27.038359 kernel: raid6: neonx1 xor() 8757 MB/s Feb 9 10:26:27.055358 kernel: raid6: int64x8 gen() 6272 MB/s Feb 9 10:26:27.072359 kernel: raid6: int64x8 xor() 3539 MB/s Feb 9 10:26:27.089360 kernel: raid6: int64x4 gen() 7231 MB/s Feb 9 10:26:27.106361 kernel: raid6: int64x4 xor() 3850 MB/s Feb 9 10:26:27.123358 kernel: raid6: int64x2 gen() 6140 MB/s Feb 9 10:26:27.140369 kernel: raid6: int64x2 xor() 3314 MB/s Feb 9 10:26:27.157369 kernel: raid6: int64x1 gen() 5034 MB/s Feb 9 10:26:27.174549 kernel: raid6: int64x1 xor() 2641 MB/s Feb 9 10:26:27.174563 kernel: raid6: using algorithm neonx8 gen() 13766 MB/s Feb 9 10:26:27.174572 kernel: raid6: .... xor() 10801 MB/s, rmw enabled Feb 9 10:26:27.174580 kernel: raid6: using neon recovery algorithm Feb 9 10:26:27.185373 kernel: xor: measuring software checksum speed Feb 9 10:26:27.185399 kernel: 8regs : 17304 MB/sec Feb 9 10:26:27.186362 kernel: 32regs : 20755 MB/sec Feb 9 10:26:27.187376 kernel: arm64_neon : 27959 MB/sec Feb 9 10:26:27.187395 kernel: xor: using function: arm64_neon (27959 MB/sec) Feb 9 10:26:27.240369 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:26:27.249732 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:26:27.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:27.252000 audit: BPF prog-id=7 op=LOAD Feb 9 10:26:27.252000 audit: BPF prog-id=8 op=LOAD Feb 9 10:26:27.253035 systemd[1]: Starting systemd-udevd.service... Feb 9 10:26:27.254130 kernel: audit: type=1130 audit(1707474387.250:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:27.271700 systemd-udevd[489]: Using default interface naming scheme 'v252'. Feb 9 10:26:27.274977 systemd[1]: Started systemd-udevd.service. Feb 9 10:26:27.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:27.276739 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:26:27.287753 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 9 10:26:27.311110 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:26:27.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:27.312430 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:26:27.344775 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:26:27.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:27.374369 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 10:26:27.376482 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 10:26:27.376506 kernel: GPT:9289727 != 19775487 Feb 9 10:26:27.376515 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 10:26:27.376524 kernel: GPT:9289727 != 19775487 Feb 9 10:26:27.377620 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 10:26:27.377642 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:26:27.396283 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:26:27.398686 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (540) Feb 9 10:26:27.400192 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:26:27.407024 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:26:27.409786 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:26:27.410776 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:26:27.415249 systemd[1]: Starting disk-uuid.service... Feb 9 10:26:27.421045 disk-uuid[561]: Primary Header is updated. Feb 9 10:26:27.421045 disk-uuid[561]: Secondary Entries is updated. Feb 9 10:26:27.421045 disk-uuid[561]: Secondary Header is updated. Feb 9 10:26:27.425379 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:26:28.436055 disk-uuid[562]: The operation has completed successfully. Feb 9 10:26:28.437150 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 10:26:28.459117 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:26:28.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.459208 systemd[1]: Finished disk-uuid.service. Feb 9 10:26:28.463136 systemd[1]: Starting verity-setup.service... Feb 9 10:26:28.476375 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:26:28.495901 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:26:28.497978 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:26:28.499914 systemd[1]: Finished verity-setup.service. Feb 9 10:26:28.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.545370 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:26:28.545811 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:26:28.546573 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:26:28.547232 systemd[1]: Starting ignition-setup.service... Feb 9 10:26:28.549224 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:26:28.555383 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:26:28.555422 kernel: BTRFS info (device vda6): using free space tree Feb 9 10:26:28.555432 kernel: BTRFS info (device vda6): has skinny extents Feb 9 10:26:28.562796 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:26:28.569010 systemd[1]: Finished ignition-setup.service. Feb 9 10:26:28.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.570287 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:26:28.622760 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:26:28.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.623000 audit: BPF prog-id=9 op=LOAD Feb 9 10:26:28.624770 systemd[1]: Starting systemd-networkd.service... Feb 9 10:26:28.653686 systemd-networkd[739]: lo: Link UP Feb 9 10:26:28.653700 systemd-networkd[739]: lo: Gained carrier Feb 9 10:26:28.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.654060 systemd-networkd[739]: Enumeration completed Feb 9 10:26:28.654168 systemd[1]: Started systemd-networkd.service. Feb 9 10:26:28.654235 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:26:28.657492 ignition[651]: Ignition 2.14.0 Feb 9 10:26:28.655036 systemd[1]: Reached target network.target. Feb 9 10:26:28.657499 ignition[651]: Stage: fetch-offline Feb 9 10:26:28.655592 systemd-networkd[739]: eth0: Link UP Feb 9 10:26:28.657537 ignition[651]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:26:28.655596 systemd-networkd[739]: eth0: Gained carrier Feb 9 10:26:28.657545 ignition[651]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:26:28.656926 systemd[1]: Starting iscsiuio.service... Feb 9 10:26:28.657658 ignition[651]: parsed url from cmdline: "" Feb 9 10:26:28.657661 ignition[651]: no config URL provided Feb 9 10:26:28.657665 ignition[651]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:26:28.657672 ignition[651]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:26:28.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.666340 systemd[1]: Started iscsiuio.service. Feb 9 10:26:28.657687 ignition[651]: op(1): [started] loading QEMU firmware config module Feb 9 10:26:28.668093 systemd[1]: Starting iscsid.service... Feb 9 10:26:28.657692 ignition[651]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 10:26:28.669419 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.3/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 10:26:28.661417 ignition[651]: op(1): [finished] loading QEMU firmware config module Feb 9 10:26:28.673278 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:26:28.673278 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:26:28.673278 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:26:28.673278 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:26:28.673278 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:26:28.673278 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:26:28.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.674009 systemd[1]: Started iscsid.service. Feb 9 10:26:28.675827 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:26:28.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.686589 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:26:28.687603 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:26:28.688344 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:26:28.689206 systemd[1]: Reached target remote-fs.target. Feb 9 10:26:28.690596 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:26:28.698047 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:26:28.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.749272 ignition[651]: parsing config with SHA512: 2ec91ef052aa5e137ceaa41e2ed076900be8247c54a8dcbbe490d7e882f73c915502db736174f1402ff687ed3f652a06f15a7ad5add5593a4876bb6a5f7f035f Feb 9 10:26:28.787733 unknown[651]: fetched base config from "system" Feb 9 10:26:28.787744 unknown[651]: fetched user config from "qemu" Feb 9 10:26:28.788369 ignition[651]: fetch-offline: fetch-offline passed Feb 9 10:26:28.788437 ignition[651]: Ignition finished successfully Feb 9 10:26:28.790338 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:26:28.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.791073 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 10:26:28.791751 systemd[1]: Starting ignition-kargs.service... Feb 9 10:26:28.799857 ignition[761]: Ignition 2.14.0 Feb 9 10:26:28.799867 ignition[761]: Stage: kargs Feb 9 10:26:28.799961 ignition[761]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:26:28.799971 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:26:28.800932 ignition[761]: kargs: kargs passed Feb 9 10:26:28.802304 systemd[1]: Finished ignition-kargs.service. Feb 9 10:26:28.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.800984 ignition[761]: Ignition finished successfully Feb 9 10:26:28.803934 systemd[1]: Starting ignition-disks.service... Feb 9 10:26:28.809576 ignition[767]: Ignition 2.14.0 Feb 9 10:26:28.809586 ignition[767]: Stage: disks Feb 9 10:26:28.809667 ignition[767]: no configs at "/usr/lib/ignition/base.d" Feb 9 10:26:28.809676 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:26:28.811910 systemd[1]: Finished ignition-disks.service. Feb 9 10:26:28.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.810631 ignition[767]: disks: disks passed Feb 9 10:26:28.813187 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:26:28.810673 ignition[767]: Ignition finished successfully Feb 9 10:26:28.814119 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:26:28.814990 systemd[1]: Reached target local-fs.target. Feb 9 10:26:28.815962 systemd[1]: Reached target sysinit.target. Feb 9 10:26:28.816864 systemd[1]: Reached target basic.target. Feb 9 10:26:28.818651 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:26:28.828852 systemd-fsck[775]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 10:26:28.831826 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:26:28.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.833330 systemd[1]: Mounting sysroot.mount... Feb 9 10:26:28.838208 systemd[1]: Mounted sysroot.mount. Feb 9 10:26:28.839283 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:26:28.838855 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:26:28.840802 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:26:28.841631 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 10:26:28.841669 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:26:28.841692 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:26:28.843329 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:26:28.844951 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:26:28.849122 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:26:28.853595 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:26:28.857443 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:26:28.861225 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:26:28.887089 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:26:28.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.888562 systemd[1]: Starting ignition-mount.service... Feb 9 10:26:28.889685 systemd[1]: Starting sysroot-boot.service... Feb 9 10:26:28.894484 bash[826]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 10:26:28.902951 ignition[828]: INFO : Ignition 2.14.0 Feb 9 10:26:28.902951 ignition[828]: INFO : Stage: mount Feb 9 10:26:28.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.903621 systemd[1]: Finished sysroot-boot.service. Feb 9 10:26:28.906374 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:26:28.906374 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:26:28.906374 ignition[828]: INFO : mount: mount passed Feb 9 10:26:28.906374 ignition[828]: INFO : Ignition finished successfully Feb 9 10:26:28.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:28.906401 systemd[1]: Finished ignition-mount.service. Feb 9 10:26:29.506232 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:26:29.512811 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (836) Feb 9 10:26:29.512839 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:26:29.512855 kernel: BTRFS info (device vda6): using free space tree Feb 9 10:26:29.513703 kernel: BTRFS info (device vda6): has skinny extents Feb 9 10:26:29.516316 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:26:29.517790 systemd[1]: Starting ignition-files.service... Feb 9 10:26:29.530688 ignition[856]: INFO : Ignition 2.14.0 Feb 9 10:26:29.530688 ignition[856]: INFO : Stage: files Feb 9 10:26:29.532085 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:26:29.532085 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:26:29.532085 ignition[856]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:26:29.535113 ignition[856]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:26:29.535113 ignition[856]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:26:29.537181 ignition[856]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:26:29.537181 ignition[856]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:26:29.537181 ignition[856]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:26:29.536999 unknown[856]: wrote ssh authorized keys file for user: core Feb 9 10:26:29.542920 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:26:29.542920 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 10:26:29.700665 systemd-networkd[739]: eth0: Gained IPv6LL Feb 9 10:26:29.881740 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:26:30.070210 ignition[856]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 10:26:30.072970 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:26:30.072970 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:26:30.072970 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:26:30.339987 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:26:30.525599 ignition[856]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 10:26:30.527856 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:26:30.527856 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:26:30.527856 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 10:26:30.575597 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:26:30.616173 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:26:30.617698 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:26:30.617698 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:26:30.662622 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:26:30.917728 ignition[856]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 10:26:30.917728 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:26:30.920901 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:26:30.920901 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:26:30.949840 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 10:26:31.700657 ignition[856]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 10:26:31.702969 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:26:31.702969 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:26:31.702969 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 10:26:31.723590 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 10:26:31.994487 ignition[856]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 10:26:31.994487 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:26:31.997620 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:26:31.997620 ignition[856]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:26:31.997620 ignition[856]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:26:31.997620 ignition[856]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:26:31.997620 ignition[856]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:26:31.997620 ignition[856]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(18): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 10:26:32.020515 ignition[856]: INFO : files: op(18): op(19): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 10:26:32.038259 ignition[856]: INFO : files: op(18): op(19): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 10:26:32.039338 ignition[856]: INFO : files: op(18): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 10:26:32.039338 ignition[856]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:26:32.039338 ignition[856]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:26:32.039338 ignition[856]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:26:32.039338 ignition[856]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:26:32.039338 ignition[856]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:26:32.039338 ignition[856]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:26:32.039338 ignition[856]: INFO : files: files passed Feb 9 10:26:32.039338 ignition[856]: INFO : Ignition finished successfully Feb 9 10:26:32.060905 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:26:32.060932 kernel: audit: type=1130 audit(1707474392.041:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.060949 kernel: audit: type=1130 audit(1707474392.049:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.060959 kernel: audit: type=1131 audit(1707474392.049:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.060968 kernel: audit: type=1130 audit(1707474392.054:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.040857 systemd[1]: Finished ignition-files.service. Feb 9 10:26:32.042327 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:26:32.062575 initrd-setup-root-after-ignition[881]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 10:26:32.043001 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:26:32.064960 initrd-setup-root-after-ignition[883]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:26:32.043625 systemd[1]: Starting ignition-quench.service... Feb 9 10:26:32.048203 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:26:32.048279 systemd[1]: Finished ignition-quench.service. Feb 9 10:26:32.052852 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:26:32.054698 systemd[1]: Reached target ignition-complete.target. Feb 9 10:26:32.058724 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:26:32.070193 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:26:32.070271 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:26:32.075497 kernel: audit: type=1130 audit(1707474392.071:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.075515 kernel: audit: type=1131 audit(1707474392.071:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.071718 systemd[1]: Reached target initrd-fs.target. Feb 9 10:26:32.076087 systemd[1]: Reached target initrd.target. Feb 9 10:26:32.077128 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:26:32.077795 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:26:32.087559 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:26:32.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.088984 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:26:32.091532 kernel: audit: type=1130 audit(1707474392.087:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.096108 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:26:32.096958 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:26:32.098026 systemd[1]: Stopped target timers.target. Feb 9 10:26:32.098958 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:26:32.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.099055 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:26:32.103248 kernel: audit: type=1131 audit(1707474392.099:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.100004 systemd[1]: Stopped target initrd.target. Feb 9 10:26:32.102894 systemd[1]: Stopped target basic.target. Feb 9 10:26:32.103829 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:26:32.104938 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:26:32.106075 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:26:32.107271 systemd[1]: Stopped target remote-fs.target. Feb 9 10:26:32.108394 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:26:32.109562 systemd[1]: Stopped target sysinit.target. Feb 9 10:26:32.110606 systemd[1]: Stopped target local-fs.target. Feb 9 10:26:32.111696 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:26:32.112724 systemd[1]: Stopped target swap.target. Feb 9 10:26:32.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.113655 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:26:32.117921 kernel: audit: type=1131 audit(1707474392.114:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.113752 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:26:32.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.114820 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:26:32.121780 kernel: audit: type=1131 audit(1707474392.118:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.117418 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:26:32.117513 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:26:32.118699 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:26:32.118789 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:26:32.121485 systemd[1]: Stopped target paths.target. Feb 9 10:26:32.122415 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:26:32.124391 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:26:32.125685 systemd[1]: Stopped target slices.target. Feb 9 10:26:32.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.126630 systemd[1]: Stopped target sockets.target. Feb 9 10:26:32.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.127801 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:26:32.127902 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:26:32.132341 iscsid[745]: iscsid shutting down. Feb 9 10:26:32.129031 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:26:32.129117 systemd[1]: Stopped ignition-files.service. Feb 9 10:26:32.130748 systemd[1]: Stopping ignition-mount.service... Feb 9 10:26:32.133614 systemd[1]: Stopping iscsid.service... Feb 9 10:26:32.134519 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:26:32.134632 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:26:32.136191 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:26:32.136989 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:26:32.137115 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:26:32.140122 ignition[896]: INFO : Ignition 2.14.0 Feb 9 10:26:32.140122 ignition[896]: INFO : Stage: umount Feb 9 10:26:32.140122 ignition[896]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 10:26:32.140122 ignition[896]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 10:26:32.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.138065 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:26:32.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.138146 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:26:32.140323 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:26:32.140438 systemd[1]: Stopped iscsid.service. Feb 9 10:26:32.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.147197 ignition[896]: INFO : umount: umount passed Feb 9 10:26:32.147197 ignition[896]: INFO : Ignition finished successfully Feb 9 10:26:32.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.142953 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:26:32.143000 systemd[1]: Closed iscsid.socket. Feb 9 10:26:32.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.143917 systemd[1]: Stopping iscsiuio.service... Feb 9 10:26:32.145606 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:26:32.146032 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:26:32.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.146116 systemd[1]: Stopped iscsiuio.service. Feb 9 10:26:32.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.146988 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:26:32.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.147072 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:26:32.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.148035 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:26:32.148113 systemd[1]: Stopped ignition-mount.service. Feb 9 10:26:32.149664 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:26:32.149740 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:26:32.150799 systemd[1]: Stopped target network.target. Feb 9 10:26:32.151667 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:26:32.151697 systemd[1]: Closed iscsiuio.socket. Feb 9 10:26:32.152504 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:26:32.152537 systemd[1]: Stopped ignition-disks.service. Feb 9 10:26:32.153725 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:26:32.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.153761 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:26:32.154784 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:26:32.154818 systemd[1]: Stopped ignition-setup.service. Feb 9 10:26:32.155733 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:26:32.155769 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:26:32.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.156959 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:26:32.158034 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:26:32.163054 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:26:32.170000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:26:32.163140 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:26:32.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.165385 systemd-networkd[739]: eth0: DHCPv6 lease lost Feb 9 10:26:32.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.166336 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:26:32.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.175000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:26:32.166432 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:26:32.167548 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:26:32.167574 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:26:32.168938 systemd[1]: Stopping network-cleanup.service... Feb 9 10:26:32.169875 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:26:32.169933 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:26:32.171213 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:26:32.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.171249 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:26:32.172656 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:26:32.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.172692 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:26:32.173563 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:26:32.177712 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:26:32.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.180921 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:26:32.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.181012 systemd[1]: Stopped network-cleanup.service. Feb 9 10:26:32.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.182523 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:26:32.182637 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:26:32.183858 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:26:32.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.183895 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:26:32.184866 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:26:32.184897 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:26:32.185900 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:26:32.185947 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:26:32.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.187071 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:26:32.187108 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:26:32.188461 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:26:32.188495 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:26:32.190265 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:26:32.191233 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:26:32.191278 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:26:32.195048 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:26:32.195125 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:26:32.196420 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:26:32.198029 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:26:32.203784 systemd[1]: Switching root. Feb 9 10:26:32.214433 systemd-journald[289]: Journal stopped Feb 9 10:26:34.269470 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Feb 9 10:26:34.269527 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:26:34.269544 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:26:34.269554 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:26:34.269564 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:26:34.269580 kernel: SELinux: policy capability open_perms=1 Feb 9 10:26:34.269591 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:26:34.269600 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:26:34.269610 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:26:34.269623 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:26:34.269633 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:26:34.269642 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:26:34.269653 systemd[1]: Successfully loaded SELinux policy in 31.286ms. Feb 9 10:26:34.269666 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.651ms. Feb 9 10:26:34.269679 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:26:34.269690 systemd[1]: Detected virtualization kvm. Feb 9 10:26:34.269702 systemd[1]: Detected architecture arm64. Feb 9 10:26:34.269714 systemd[1]: Detected first boot. Feb 9 10:26:34.269724 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:26:34.269735 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:26:34.269745 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:26:34.269756 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:26:34.269769 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:26:34.269780 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:26:34.269792 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:26:34.269803 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:26:34.269814 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:26:34.269825 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:26:34.269837 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:26:34.269848 systemd[1]: Created slice system-getty.slice. Feb 9 10:26:34.269859 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:26:34.269869 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:26:34.269880 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:26:34.269890 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:26:34.269901 systemd[1]: Created slice user.slice. Feb 9 10:26:34.269911 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:26:34.269930 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:26:34.269943 systemd[1]: Set up automount boot.automount. Feb 9 10:26:34.269954 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:26:34.269965 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:26:34.269976 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:26:34.269986 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:26:34.269997 systemd[1]: Reached target integritysetup.target. Feb 9 10:26:34.270007 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:26:34.270018 systemd[1]: Reached target remote-fs.target. Feb 9 10:26:34.270030 systemd[1]: Reached target slices.target. Feb 9 10:26:34.270040 systemd[1]: Reached target swap.target. Feb 9 10:26:34.270051 systemd[1]: Reached target torcx.target. Feb 9 10:26:34.270061 systemd[1]: Reached target veritysetup.target. Feb 9 10:26:34.270073 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:26:34.270083 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:26:34.270094 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:26:34.270104 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:26:34.270115 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:26:34.270126 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:26:34.270138 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:26:34.270148 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:26:34.270158 systemd[1]: Mounting media.mount... Feb 9 10:26:34.270170 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:26:34.270180 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:26:34.270191 systemd[1]: Mounting tmp.mount... Feb 9 10:26:34.270202 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:26:34.270213 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:26:34.270223 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:26:34.270235 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:26:34.270245 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:26:34.270256 systemd[1]: Starting modprobe@drm.service... Feb 9 10:26:34.270266 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:26:34.270277 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:26:34.270287 systemd[1]: Starting modprobe@loop.service... Feb 9 10:26:34.270298 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:26:34.270309 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:26:34.270320 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:26:34.270332 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:26:34.270343 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:26:34.270366 systemd[1]: Stopped systemd-journald.service. Feb 9 10:26:34.270385 systemd[1]: Starting systemd-journald.service... Feb 9 10:26:34.270395 kernel: loop: module loaded Feb 9 10:26:34.270405 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:26:34.270417 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:26:34.270428 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:26:34.270438 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:26:34.270456 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:26:34.270467 systemd[1]: Stopped verity-setup.service. Feb 9 10:26:34.270478 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:26:34.270489 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:26:34.270499 systemd[1]: Mounted media.mount. Feb 9 10:26:34.270509 kernel: fuse: init (API version 7.34) Feb 9 10:26:34.270521 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:26:34.270548 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:26:34.270559 systemd[1]: Mounted tmp.mount. Feb 9 10:26:34.270570 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:26:34.270581 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:26:34.270593 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:26:34.270603 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:26:34.270615 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:26:34.270630 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:26:34.270641 systemd[1]: Finished modprobe@drm.service. Feb 9 10:26:34.270655 systemd-journald[995]: Journal started Feb 9 10:26:34.270694 systemd-journald[995]: Runtime Journal (/run/log/journal/f3ef765572e84a369979bb8ae380697f) is 6.0M, max 48.7M, 42.6M free. Feb 9 10:26:32.278000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:26:32.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:26:32.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:26:32.438000 audit: BPF prog-id=10 op=LOAD Feb 9 10:26:32.438000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:26:32.438000 audit: BPF prog-id=11 op=LOAD Feb 9 10:26:32.438000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:26:32.475000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:26:32.475000 audit[929]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58b2 a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.475000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:26:32.476000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:26:32.476000 audit[929]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5989 a2=1ed a3=0 items=2 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.476000 audit: CWD cwd="/" Feb 9 10:26:32.476000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:26:32.476000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:26:32.476000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:26:34.145000 audit: BPF prog-id=12 op=LOAD Feb 9 10:26:34.145000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:26:34.145000 audit: BPF prog-id=13 op=LOAD Feb 9 10:26:34.145000 audit: BPF prog-id=14 op=LOAD Feb 9 10:26:34.145000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:26:34.145000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:26:34.146000 audit: BPF prog-id=15 op=LOAD Feb 9 10:26:34.146000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:26:34.146000 audit: BPF prog-id=16 op=LOAD Feb 9 10:26:34.146000 audit: BPF prog-id=17 op=LOAD Feb 9 10:26:34.146000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:26:34.146000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:26:34.146000 audit: BPF prog-id=18 op=LOAD Feb 9 10:26:34.146000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:26:34.146000 audit: BPF prog-id=19 op=LOAD Feb 9 10:26:34.146000 audit: BPF prog-id=20 op=LOAD Feb 9 10:26:34.146000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:26:34.146000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:26:34.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.157000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:26:34.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.238000 audit: BPF prog-id=21 op=LOAD Feb 9 10:26:34.238000 audit: BPF prog-id=22 op=LOAD Feb 9 10:26:34.238000 audit: BPF prog-id=23 op=LOAD Feb 9 10:26:34.238000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:26:34.238000 audit: BPF prog-id=20 op=UNLOAD Feb 9 10:26:34.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.264000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:26:34.264000 audit[995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc3489020 a2=4000 a3=1 items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:34.264000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:26:34.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.473841 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:26:34.144269 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:26:32.474280 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:26:34.144281 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 10:26:32.474297 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:26:34.147561 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:26:32.474324 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:26:32.474333 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:26:32.474380 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:26:32.474391 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:26:34.272679 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:26:34.272699 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:26:32.474580 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:26:32.474611 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:26:34.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:32.474623 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:26:32.475023 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:26:32.475055 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:26:32.475071 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:26:32.475085 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:26:32.475100 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:26:32.475113 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:26:33.889194 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:26:33.889462 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:26:33.889561 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:26:33.889711 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:26:33.889760 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:26:33.889816 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-09T10:26:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:26:34.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.274374 systemd[1]: Started systemd-journald.service. Feb 9 10:26:34.274719 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:26:34.275063 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:26:34.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.275983 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:26:34.276127 systemd[1]: Finished modprobe@loop.service. Feb 9 10:26:34.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.277135 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:26:34.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.278117 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:26:34.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.279147 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:26:34.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.280164 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:26:34.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.281396 systemd[1]: Reached target network-pre.target. Feb 9 10:26:34.283135 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:26:34.284894 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:26:34.285552 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:26:34.288099 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:26:34.289989 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:26:34.290797 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:26:34.291788 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:26:34.292634 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:26:34.293901 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:26:34.296427 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:26:34.299504 systemd-journald[995]: Time spent on flushing to /var/log/journal/f3ef765572e84a369979bb8ae380697f is 15.166ms for 1030 entries. Feb 9 10:26:34.299504 systemd-journald[995]: System Journal (/var/log/journal/f3ef765572e84a369979bb8ae380697f) is 8.0M, max 195.6M, 187.6M free. Feb 9 10:26:34.326125 systemd-journald[995]: Received client request to flush runtime journal. Feb 9 10:26:34.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.301752 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:26:34.326618 udevadm[1029]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 10:26:34.302810 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:26:34.303999 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:26:34.304889 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:26:34.308652 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:26:34.310592 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:26:34.319403 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:26:34.320507 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:26:34.326845 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:26:34.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.652306 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:26:34.653000 audit: BPF prog-id=24 op=LOAD Feb 9 10:26:34.653000 audit: BPF prog-id=25 op=LOAD Feb 9 10:26:34.653000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:26:34.653000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:26:34.654387 systemd[1]: Starting systemd-udevd.service... Feb 9 10:26:34.672993 systemd-udevd[1032]: Using default interface naming scheme 'v252'. Feb 9 10:26:34.684857 systemd[1]: Started systemd-udevd.service. Feb 9 10:26:34.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.686000 audit: BPF prog-id=26 op=LOAD Feb 9 10:26:34.687065 systemd[1]: Starting systemd-networkd.service... Feb 9 10:26:34.695000 audit: BPF prog-id=27 op=LOAD Feb 9 10:26:34.695000 audit: BPF prog-id=28 op=LOAD Feb 9 10:26:34.695000 audit: BPF prog-id=29 op=LOAD Feb 9 10:26:34.696629 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:26:34.704877 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 10:26:34.725102 systemd[1]: Started systemd-userdbd.service. Feb 9 10:26:34.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.743720 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:26:34.791590 systemd-networkd[1040]: lo: Link UP Feb 9 10:26:34.791601 systemd-networkd[1040]: lo: Gained carrier Feb 9 10:26:34.793847 systemd-networkd[1040]: Enumeration completed Feb 9 10:26:34.794020 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:26:34.794070 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:26:34.794925 systemd[1]: Started systemd-networkd.service. Feb 9 10:26:34.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.796796 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:26:34.799496 systemd-networkd[1040]: eth0: Link UP Feb 9 10:26:34.799505 systemd-networkd[1040]: eth0: Gained carrier Feb 9 10:26:34.806236 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:26:34.820464 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.3/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 10:26:34.836115 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:26:34.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.836885 systemd[1]: Reached target cryptsetup.target. Feb 9 10:26:34.838465 systemd[1]: Starting lvm2-activation.service... Feb 9 10:26:34.841792 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:26:34.862111 systemd[1]: Finished lvm2-activation.service. Feb 9 10:26:34.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.862829 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:26:34.863445 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:26:34.863472 systemd[1]: Reached target local-fs.target. Feb 9 10:26:34.864014 systemd[1]: Reached target machines.target. Feb 9 10:26:34.865594 systemd[1]: Starting ldconfig.service... Feb 9 10:26:34.866574 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:26:34.866631 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:26:34.867817 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:26:34.869771 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:26:34.871798 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:26:34.872604 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:26:34.872655 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:26:34.873711 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:26:34.877227 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) Feb 9 10:26:34.878317 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:26:34.881085 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:26:34.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.894544 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:26:34.897986 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:26:34.906007 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:26:34.979888 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) Feb 9 10:26:34.979888 systemd-fsck[1077]: /dev/vda1: 236 files, 113719/258078 clusters Feb 9 10:26:34.982644 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:26:34.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:34.985325 systemd[1]: Mounting boot.mount... Feb 9 10:26:35.001211 systemd[1]: Mounted boot.mount. Feb 9 10:26:35.009418 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:26:35.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.023483 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:26:35.024024 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:26:35.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.061576 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:26:35.061688 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:26:35.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.063706 systemd[1]: Starting audit-rules.service... Feb 9 10:26:35.065343 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:26:35.067081 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:26:35.068000 audit: BPF prog-id=30 op=LOAD Feb 9 10:26:35.069722 systemd[1]: Starting systemd-resolved.service... Feb 9 10:26:35.070000 audit: BPF prog-id=31 op=LOAD Feb 9 10:26:35.071813 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:26:35.073481 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:26:35.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.074895 systemd[1]: Finished ldconfig.service. Feb 9 10:26:35.076269 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:26:35.077446 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:26:35.079000 audit[1092]: SYSTEM_BOOT pid=1092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.082534 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:26:35.086470 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:26:35.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.088259 systemd[1]: Starting systemd-update-done.service... Feb 9 10:26:35.093608 systemd[1]: Finished systemd-update-done.service. Feb 9 10:26:35.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:35.105000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:26:35.105000 audit[1102]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc5ca8920 a2=420 a3=0 items=0 ppid=1081 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:35.105000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:26:35.105564 augenrules[1102]: No rules Feb 9 10:26:35.106071 systemd[1]: Finished audit-rules.service. Feb 9 10:26:35.124459 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:26:35.125275 systemd-timesyncd[1091]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 10:26:35.125532 systemd[1]: Reached target time-set.target. Feb 9 10:26:35.125727 systemd-timesyncd[1091]: Initial clock synchronization to Fri 2024-02-09 10:26:34.769526 UTC. Feb 9 10:26:35.129851 systemd-resolved[1087]: Positive Trust Anchors: Feb 9 10:26:35.129862 systemd-resolved[1087]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:26:35.129888 systemd-resolved[1087]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:26:35.139570 systemd-resolved[1087]: Defaulting to hostname 'linux'. Feb 9 10:26:35.140829 systemd[1]: Started systemd-resolved.service. Feb 9 10:26:35.141613 systemd[1]: Reached target network.target. Feb 9 10:26:35.142286 systemd[1]: Reached target nss-lookup.target. Feb 9 10:26:35.143100 systemd[1]: Reached target sysinit.target. Feb 9 10:26:35.143834 systemd[1]: Started motdgen.path. Feb 9 10:26:35.144497 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:26:35.145572 systemd[1]: Started logrotate.timer. Feb 9 10:26:35.146320 systemd[1]: Started mdadm.timer. Feb 9 10:26:35.146967 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:26:35.147697 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:26:35.147729 systemd[1]: Reached target paths.target. Feb 9 10:26:35.148380 systemd[1]: Reached target timers.target. Feb 9 10:26:35.149334 systemd[1]: Listening on dbus.socket. Feb 9 10:26:35.150813 systemd[1]: Starting docker.socket... Feb 9 10:26:35.153655 systemd[1]: Listening on sshd.socket. Feb 9 10:26:35.154413 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:26:35.154806 systemd[1]: Listening on docker.socket. Feb 9 10:26:35.155577 systemd[1]: Reached target sockets.target. Feb 9 10:26:35.156261 systemd[1]: Reached target basic.target. Feb 9 10:26:35.157007 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:26:35.157039 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:26:35.157910 systemd[1]: Starting containerd.service... Feb 9 10:26:35.159461 systemd[1]: Starting dbus.service... Feb 9 10:26:35.160959 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:26:35.162785 systemd[1]: Starting extend-filesystems.service... Feb 9 10:26:35.163587 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:26:35.164716 systemd[1]: Starting motdgen.service... Feb 9 10:26:35.166419 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:26:35.167977 systemd[1]: Starting prepare-critools.service... Feb 9 10:26:35.169296 jq[1112]: false Feb 9 10:26:35.170247 systemd[1]: Starting prepare-helm.service... Feb 9 10:26:35.171939 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:26:35.173843 systemd[1]: Starting sshd-keygen.service... Feb 9 10:26:35.176443 systemd[1]: Starting systemd-logind.service... Feb 9 10:26:35.177105 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:26:35.177161 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:26:35.177557 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:26:35.178160 systemd[1]: Starting update-engine.service... Feb 9 10:26:35.180269 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda1 Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda2 Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda3 Feb 9 10:26:35.181518 extend-filesystems[1113]: Found usr Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda4 Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda6 Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda7 Feb 9 10:26:35.181518 extend-filesystems[1113]: Found vda9 Feb 9 10:26:35.181518 extend-filesystems[1113]: Checking size of /dev/vda9 Feb 9 10:26:35.212434 jq[1127]: true Feb 9 10:26:35.183518 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:26:35.183651 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:26:35.213434 tar[1135]: ./ Feb 9 10:26:35.213434 tar[1135]: ./macvlan Feb 9 10:26:35.185648 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:26:35.219421 tar[1136]: crictl Feb 9 10:26:35.185783 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:26:35.219709 tar[1137]: linux-arm64/helm Feb 9 10:26:35.199569 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:26:35.219948 jq[1139]: true Feb 9 10:26:35.199714 systemd[1]: Finished motdgen.service. Feb 9 10:26:35.238812 extend-filesystems[1113]: Resized partition /dev/vda9 Feb 9 10:26:35.241692 dbus-daemon[1111]: [system] SELinux support is enabled Feb 9 10:26:35.241864 systemd[1]: Started dbus.service. Feb 9 10:26:35.244045 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:26:35.244075 systemd[1]: Reached target system-config.target. Feb 9 10:26:35.244863 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:26:35.244885 systemd[1]: Reached target user-config.target. Feb 9 10:26:35.246192 extend-filesystems[1159]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 10:26:35.275102 systemd-logind[1124]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 10:26:35.275719 systemd-logind[1124]: New seat seat0. Feb 9 10:26:35.279039 systemd[1]: Started systemd-logind.service. Feb 9 10:26:35.285366 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 10:26:35.303321 update_engine[1125]: I0209 10:26:35.299561 1125 main.cc:92] Flatcar Update Engine starting Feb 9 10:26:35.307503 update_engine[1125]: I0209 10:26:35.305943 1125 update_check_scheduler.cc:74] Next update check in 7m49s Feb 9 10:26:35.307844 tar[1135]: ./static Feb 9 10:26:35.305830 systemd[1]: Started update-engine.service. Feb 9 10:26:35.308442 systemd[1]: Started locksmithd.service. Feb 9 10:26:35.314373 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 10:26:35.329900 extend-filesystems[1159]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 10:26:35.329900 extend-filesystems[1159]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 10:26:35.329900 extend-filesystems[1159]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 10:26:35.333330 extend-filesystems[1113]: Resized filesystem in /dev/vda9 Feb 9 10:26:35.330908 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:26:35.336516 bash[1163]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:26:35.331075 systemd[1]: Finished extend-filesystems.service. Feb 9 10:26:35.332737 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:26:35.337573 env[1140]: time="2024-02-09T10:26:35.337477720Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:26:35.344940 tar[1135]: ./vlan Feb 9 10:26:35.383317 tar[1135]: ./portmap Feb 9 10:26:35.398678 env[1140]: time="2024-02-09T10:26:35.398635720Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:26:35.398800 env[1140]: time="2024-02-09T10:26:35.398778280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402480720Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402518320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402709080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402725960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402738760Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402747680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.402814280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.403087680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.403194960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:26:35.403509 env[1140]: time="2024-02-09T10:26:35.403209080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:26:35.403747 env[1140]: time="2024-02-09T10:26:35.403261640Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:26:35.403747 env[1140]: time="2024-02-09T10:26:35.403274120Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:26:35.412559 tar[1135]: ./host-local Feb 9 10:26:35.417435 env[1140]: time="2024-02-09T10:26:35.417400640Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:26:35.417435 env[1140]: time="2024-02-09T10:26:35.417432760Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:26:35.417540 env[1140]: time="2024-02-09T10:26:35.417447640Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:26:35.417540 env[1140]: time="2024-02-09T10:26:35.417476400Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417540 env[1140]: time="2024-02-09T10:26:35.417491720Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417540 env[1140]: time="2024-02-09T10:26:35.417505000Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417540 env[1140]: time="2024-02-09T10:26:35.417519280Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417877 env[1140]: time="2024-02-09T10:26:35.417855080Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417943 env[1140]: time="2024-02-09T10:26:35.417880320Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417943 env[1140]: time="2024-02-09T10:26:35.417894360Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417943 env[1140]: time="2024-02-09T10:26:35.417905520Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.417943 env[1140]: time="2024-02-09T10:26:35.417929080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:26:35.418065 env[1140]: time="2024-02-09T10:26:35.418044240Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:26:35.418141 env[1140]: time="2024-02-09T10:26:35.418122600Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:26:35.418414 env[1140]: time="2024-02-09T10:26:35.418386960Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:26:35.418470 env[1140]: time="2024-02-09T10:26:35.418436480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418470 env[1140]: time="2024-02-09T10:26:35.418451560Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:26:35.418591 env[1140]: time="2024-02-09T10:26:35.418572840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418591 env[1140]: time="2024-02-09T10:26:35.418589880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418651 env[1140]: time="2024-02-09T10:26:35.418602840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418651 env[1140]: time="2024-02-09T10:26:35.418622080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418651 env[1140]: time="2024-02-09T10:26:35.418635040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418651 env[1140]: time="2024-02-09T10:26:35.418647480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418736 env[1140]: time="2024-02-09T10:26:35.418658840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418736 env[1140]: time="2024-02-09T10:26:35.418670040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418736 env[1140]: time="2024-02-09T10:26:35.418683760Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:26:35.418893 env[1140]: time="2024-02-09T10:26:35.418832560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418893 env[1140]: time="2024-02-09T10:26:35.418865400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418893 env[1140]: time="2024-02-09T10:26:35.418878520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.418983 env[1140]: time="2024-02-09T10:26:35.418893640Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:26:35.418983 env[1140]: time="2024-02-09T10:26:35.418908120Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:26:35.418983 env[1140]: time="2024-02-09T10:26:35.418938120Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:26:35.418983 env[1140]: time="2024-02-09T10:26:35.418955200Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:26:35.419066 env[1140]: time="2024-02-09T10:26:35.418986880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:26:35.419247 env[1140]: time="2024-02-09T10:26:35.419193840Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.419255920Z" level=info msg="Connect containerd service" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.419288200Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.419968320Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.420245880Z" level=info msg="Start subscribing containerd event" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.420289800Z" level=info msg="Start recovering state" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.420356080Z" level=info msg="Start event monitor" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.420420040Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.420459640Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.420505120Z" level=info msg="containerd successfully booted in 0.086029s" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.421956760Z" level=info msg="Start snapshots syncer" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.421970920Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:26:35.421981 env[1140]: time="2024-02-09T10:26:35.421978640Z" level=info msg="Start streaming server" Feb 9 10:26:35.420581 systemd[1]: Started containerd.service. Feb 9 10:26:35.452828 tar[1135]: ./vrf Feb 9 10:26:35.477326 tar[1135]: ./bridge Feb 9 10:26:35.506015 tar[1135]: ./tuning Feb 9 10:26:35.529604 tar[1135]: ./firewall Feb 9 10:26:35.561061 tar[1135]: ./host-device Feb 9 10:26:35.587122 tar[1135]: ./sbr Feb 9 10:26:35.610802 tar[1135]: ./loopback Feb 9 10:26:35.633772 tar[1135]: ./dhcp Feb 9 10:26:35.654675 tar[1137]: linux-arm64/LICENSE Feb 9 10:26:35.654832 tar[1137]: linux-arm64/README.md Feb 9 10:26:35.659194 systemd[1]: Finished prepare-helm.service. Feb 9 10:26:35.681371 locksmithd[1169]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:26:35.708723 tar[1135]: ./ptp Feb 9 10:26:35.728240 systemd[1]: Finished prepare-critools.service. Feb 9 10:26:35.738092 tar[1135]: ./ipvlan Feb 9 10:26:35.765276 tar[1135]: ./bandwidth Feb 9 10:26:35.802767 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:26:35.908482 systemd-networkd[1040]: eth0: Gained IPv6LL Feb 9 10:26:38.104191 sshd_keygen[1138]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:26:38.120363 systemd[1]: Finished sshd-keygen.service. Feb 9 10:26:38.122386 systemd[1]: Starting issuegen.service... Feb 9 10:26:38.126308 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:26:38.126499 systemd[1]: Finished issuegen.service. Feb 9 10:26:38.128418 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:26:38.133583 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:26:38.135526 systemd[1]: Started getty@tty1.service. Feb 9 10:26:38.137271 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 10:26:38.138368 systemd[1]: Reached target getty.target. Feb 9 10:26:38.138958 systemd[1]: Reached target multi-user.target. Feb 9 10:26:38.140535 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:26:38.146069 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:26:38.146205 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:26:38.147200 systemd[1]: Startup finished in 550ms (kernel) + 5.667s (initrd) + 5.907s (userspace) = 12.125s. Feb 9 10:26:39.931276 systemd[1]: Created slice system-sshd.slice. Feb 9 10:26:39.932558 systemd[1]: Started sshd@0-10.0.0.3:22-10.0.0.1:39712.service. Feb 9 10:26:39.974399 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 39712 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:39.976178 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:39.986085 systemd-logind[1124]: New session 1 of user core. Feb 9 10:26:39.987095 systemd[1]: Created slice user-500.slice. Feb 9 10:26:39.988243 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:26:39.995127 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:26:39.996399 systemd[1]: Starting user@500.service... Feb 9 10:26:39.998708 (systemd)[1202]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.052175 systemd[1202]: Queued start job for default target default.target. Feb 9 10:26:40.052608 systemd[1202]: Reached target paths.target. Feb 9 10:26:40.052627 systemd[1202]: Reached target sockets.target. Feb 9 10:26:40.052638 systemd[1202]: Reached target timers.target. Feb 9 10:26:40.052648 systemd[1202]: Reached target basic.target. Feb 9 10:26:40.052695 systemd[1202]: Reached target default.target. Feb 9 10:26:40.052716 systemd[1202]: Startup finished in 49ms. Feb 9 10:26:40.052905 systemd[1]: Started user@500.service. Feb 9 10:26:40.053727 systemd[1]: Started session-1.scope. Feb 9 10:26:40.101308 systemd[1]: Started sshd@1-10.0.0.3:22-10.0.0.1:39726.service. Feb 9 10:26:40.144320 sshd[1211]: Accepted publickey for core from 10.0.0.1 port 39726 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:40.145406 sshd[1211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.148460 systemd-logind[1124]: New session 2 of user core. Feb 9 10:26:40.149202 systemd[1]: Started session-2.scope. Feb 9 10:26:40.202083 sshd[1211]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:40.204298 systemd[1]: sshd@1-10.0.0.3:22-10.0.0.1:39726.service: Deactivated successfully. Feb 9 10:26:40.204875 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 10:26:40.205912 systemd-logind[1124]: Session 2 logged out. Waiting for processes to exit. Feb 9 10:26:40.207141 systemd[1]: Started sshd@2-10.0.0.3:22-10.0.0.1:39736.service. Feb 9 10:26:40.207986 systemd-logind[1124]: Removed session 2. Feb 9 10:26:40.237466 sshd[1217]: Accepted publickey for core from 10.0.0.1 port 39736 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:40.238422 sshd[1217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.241143 systemd-logind[1124]: New session 3 of user core. Feb 9 10:26:40.241818 systemd[1]: Started session-3.scope. Feb 9 10:26:40.289244 sshd[1217]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:40.291483 systemd[1]: sshd@2-10.0.0.3:22-10.0.0.1:39736.service: Deactivated successfully. Feb 9 10:26:40.291950 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 10:26:40.292381 systemd-logind[1124]: Session 3 logged out. Waiting for processes to exit. Feb 9 10:26:40.293221 systemd[1]: Started sshd@3-10.0.0.3:22-10.0.0.1:39740.service. Feb 9 10:26:40.293866 systemd-logind[1124]: Removed session 3. Feb 9 10:26:40.323392 sshd[1223]: Accepted publickey for core from 10.0.0.1 port 39740 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:40.324343 sshd[1223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.329723 systemd-logind[1124]: New session 4 of user core. Feb 9 10:26:40.330462 systemd[1]: Started session-4.scope. Feb 9 10:26:40.385295 sshd[1223]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:40.388167 systemd[1]: sshd@3-10.0.0.3:22-10.0.0.1:39740.service: Deactivated successfully. Feb 9 10:26:40.388826 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:26:40.389351 systemd-logind[1124]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:26:40.390500 systemd[1]: Started sshd@4-10.0.0.3:22-10.0.0.1:39754.service. Feb 9 10:26:40.391802 systemd-logind[1124]: Removed session 4. Feb 9 10:26:40.421903 sshd[1233]: Accepted publickey for core from 10.0.0.1 port 39754 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:40.422996 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.425887 systemd-logind[1124]: New session 5 of user core. Feb 9 10:26:40.426645 systemd[1]: Started session-5.scope. Feb 9 10:26:40.555949 sudo[1236]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:26:40.556176 sudo[1236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:40.573543 dbus-daemon[1111]: avc: received setenforce notice (enforcing=1) Feb 9 10:26:40.574270 sudo[1236]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:40.576010 sshd[1233]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:40.578446 systemd[1]: sshd@4-10.0.0.3:22-10.0.0.1:39754.service: Deactivated successfully. Feb 9 10:26:40.579088 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:26:40.580553 systemd-logind[1124]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:26:40.580692 systemd[1]: Started sshd@5-10.0.0.3:22-10.0.0.1:39756.service. Feb 9 10:26:40.581443 systemd-logind[1124]: Removed session 5. Feb 9 10:26:40.611354 sshd[1240]: Accepted publickey for core from 10.0.0.1 port 39756 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:40.612359 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.615038 systemd-logind[1124]: New session 6 of user core. Feb 9 10:26:40.615754 systemd[1]: Started session-6.scope. Feb 9 10:26:40.664726 sudo[1244]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:26:40.664920 sudo[1244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:40.667161 sudo[1244]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:40.670792 sudo[1243]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:26:40.670990 sudo[1243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:40.678355 systemd[1]: Stopping audit-rules.service... Feb 9 10:26:40.678000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:26:40.679716 auditctl[1247]: No rules Feb 9 10:26:40.680090 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:26:40.680229 systemd[1]: Stopped audit-rules.service. Feb 9 10:26:40.681157 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 9 10:26:40.681237 kernel: audit: type=1305 audit(1707474400.678:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:26:40.681272 kernel: audit: type=1300 audit(1707474400.678:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffca4a3840 a2=420 a3=0 items=0 ppid=1 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:40.678000 audit[1247]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffca4a3840 a2=420 a3=0 items=0 ppid=1 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:40.681500 systemd[1]: Starting audit-rules.service... Feb 9 10:26:40.678000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:26:40.684383 kernel: audit: type=1327 audit(1707474400.678:169): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:26:40.684407 kernel: audit: type=1131 audit(1707474400.678:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.695943 augenrules[1264]: No rules Feb 9 10:26:40.696508 systemd[1]: Finished audit-rules.service. Feb 9 10:26:40.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.697202 sudo[1243]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:40.695000 audit[1243]: USER_END pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.700568 kernel: audit: type=1130 audit(1707474400.695:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.700613 kernel: audit: type=1106 audit(1707474400.695:172): pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.700641 kernel: audit: type=1104 audit(1707474400.695:173): pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.695000 audit[1243]: CRED_DISP pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.700941 sshd[1240]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:40.703383 kernel: audit: type=1106 audit(1707474400.701:174): pid=1240 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.701000 audit[1240]: USER_END pid=1240 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.703474 systemd[1]: sshd@5-10.0.0.3:22-10.0.0.1:39756.service: Deactivated successfully. Feb 9 10:26:40.704059 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:26:40.704541 systemd-logind[1124]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:26:40.705191 kernel: audit: type=1104 audit(1707474400.701:175): pid=1240 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.701000 audit[1240]: CRED_DISP pid=1240 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.705435 systemd[1]: Started sshd@6-10.0.0.3:22-10.0.0.1:39766.service. Feb 9 10:26:40.705956 systemd-logind[1124]: Removed session 6. Feb 9 10:26:40.707105 kernel: audit: type=1131 audit(1707474400.703:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:39756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:39756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:39766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.736000 audit[1270]: USER_ACCT pid=1270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.736910 sshd[1270]: Accepted publickey for core from 10.0.0.1 port 39766 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:26:40.737000 audit[1270]: CRED_ACQ pid=1270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.737000 audit[1270]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0750710 a2=3 a3=1 items=0 ppid=1 pid=1270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:40.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:26:40.738056 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:40.740998 systemd-logind[1124]: New session 7 of user core. Feb 9 10:26:40.741716 systemd[1]: Started session-7.scope. Feb 9 10:26:40.744000 audit[1270]: USER_START pid=1270 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.745000 audit[1272]: CRED_ACQ pid=1272 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:26:40.790167 sudo[1273]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:26:40.788000 audit[1273]: USER_ACCT pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.788000 audit[1273]: CRED_REFR pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:40.790381 sudo[1273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:40.790000 audit[1273]: USER_START pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:41.350464 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:26:41.355657 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:26:41.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:41.355958 systemd[1]: Reached target network-online.target. Feb 9 10:26:41.357063 systemd[1]: Starting docker.service... Feb 9 10:26:41.429168 env[1291]: time="2024-02-09T10:26:41.429107987Z" level=info msg="Starting up" Feb 9 10:26:41.430555 env[1291]: time="2024-02-09T10:26:41.430533130Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:26:41.430555 env[1291]: time="2024-02-09T10:26:41.430554042Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:26:41.430641 env[1291]: time="2024-02-09T10:26:41.430571592Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:26:41.430641 env[1291]: time="2024-02-09T10:26:41.430582068Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:26:41.432512 env[1291]: time="2024-02-09T10:26:41.432486387Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:26:41.432512 env[1291]: time="2024-02-09T10:26:41.432508198Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:26:41.432592 env[1291]: time="2024-02-09T10:26:41.432521879Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:26:41.432592 env[1291]: time="2024-02-09T10:26:41.432530596Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:26:41.456214 env[1291]: time="2024-02-09T10:26:41.456184790Z" level=info msg="Loading containers: start." Feb 9 10:26:41.491000 audit[1325]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.491000 audit[1325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffec500a80 a2=0 a3=1 items=0 ppid=1291 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 10:26:41.493000 audit[1327]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.493000 audit[1327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe3d69ce0 a2=0 a3=1 items=0 ppid=1291 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.493000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 10:26:41.494000 audit[1329]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.494000 audit[1329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc88f4440 a2=0 a3=1 items=0 ppid=1291 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:26:41.496000 audit[1331]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.496000 audit[1331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc83f01e0 a2=0 a3=1 items=0 ppid=1291 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.496000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:26:41.498000 audit[1333]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.498000 audit[1333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe4de0c00 a2=0 a3=1 items=0 ppid=1291 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 10:26:41.523000 audit[1338]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.523000 audit[1338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeb175460 a2=0 a3=1 items=0 ppid=1291 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 10:26:41.527000 audit[1340]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.527000 audit[1340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeabbb520 a2=0 a3=1 items=0 ppid=1291 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.527000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 10:26:41.529000 audit[1342]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.529000 audit[1342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff6a69c00 a2=0 a3=1 items=0 ppid=1291 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 10:26:41.530000 audit[1344]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.530000 audit[1344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc0e43ea0 a2=0 a3=1 items=0 ppid=1291 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.530000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:41.537000 audit[1348]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.537000 audit[1348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd0336680 a2=0 a3=1 items=0 ppid=1291 pid=1348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:41.538000 audit[1349]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.538000 audit[1349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffef6edc40 a2=0 a3=1 items=0 ppid=1291 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.538000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:41.544427 kernel: Initializing XFRM netlink socket Feb 9 10:26:41.568216 env[1291]: time="2024-02-09T10:26:41.568173060Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 10:26:41.581000 audit[1357]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.581000 audit[1357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffdd98ad60 a2=0 a3=1 items=0 ppid=1291 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 10:26:41.600000 audit[1360]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.600000 audit[1360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd02c6cc0 a2=0 a3=1 items=0 ppid=1291 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 10:26:41.603000 audit[1363]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.603000 audit[1363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcab4f9c0 a2=0 a3=1 items=0 ppid=1291 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 10:26:41.605000 audit[1365]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.605000 audit[1365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffb25f820 a2=0 a3=1 items=0 ppid=1291 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 10:26:41.607000 audit[1367]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.607000 audit[1367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc8c75760 a2=0 a3=1 items=0 ppid=1291 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.607000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 10:26:41.609000 audit[1369]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.609000 audit[1369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcdd5bb30 a2=0 a3=1 items=0 ppid=1291 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 10:26:41.610000 audit[1371]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.610000 audit[1371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd1494030 a2=0 a3=1 items=0 ppid=1291 pid=1371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 10:26:41.615000 audit[1374]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.615000 audit[1374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc7a77bc0 a2=0 a3=1 items=0 ppid=1291 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.615000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 10:26:41.617000 audit[1376]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.617000 audit[1376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd82a2650 a2=0 a3=1 items=0 ppid=1291 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:26:41.619000 audit[1378]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.619000 audit[1378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff61b7c20 a2=0 a3=1 items=0 ppid=1291 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.619000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:26:41.621000 audit[1380]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.621000 audit[1380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd987eaf0 a2=0 a3=1 items=0 ppid=1291 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.621000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 10:26:41.622952 systemd-networkd[1040]: docker0: Link UP Feb 9 10:26:41.627000 audit[1384]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.627000 audit[1384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe12e9b40 a2=0 a3=1 items=0 ppid=1291 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.627000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:41.628000 audit[1385]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:41.628000 audit[1385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe798e1c0 a2=0 a3=1 items=0 ppid=1291 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:41.628000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:41.630236 env[1291]: time="2024-02-09T10:26:41.630200635Z" level=info msg="Loading containers: done." Feb 9 10:26:41.650989 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck257277689-merged.mount: Deactivated successfully. Feb 9 10:26:41.658155 env[1291]: time="2024-02-09T10:26:41.658109266Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 10:26:41.658285 env[1291]: time="2024-02-09T10:26:41.658257214Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 10:26:41.658395 env[1291]: time="2024-02-09T10:26:41.658372249Z" level=info msg="Daemon has completed initialization" Feb 9 10:26:41.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:41.676384 systemd[1]: Started docker.service. Feb 9 10:26:41.678238 env[1291]: time="2024-02-09T10:26:41.678127863Z" level=info msg="API listen on /run/docker.sock" Feb 9 10:26:41.695173 systemd[1]: Reloading. Feb 9 10:26:41.737843 /usr/lib/systemd/system-generators/torcx-generator[1434]: time="2024-02-09T10:26:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:26:41.737872 /usr/lib/systemd/system-generators/torcx-generator[1434]: time="2024-02-09T10:26:41Z" level=info msg="torcx already run" Feb 9 10:26:41.787757 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:26:41.787781 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:26:41.802292 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.847000 audit: BPF prog-id=37 op=LOAD Feb 9 10:26:41.847000 audit: BPF prog-id=30 op=UNLOAD Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit: BPF prog-id=38 op=LOAD Feb 9 10:26:41.848000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.848000 audit: BPF prog-id=39 op=LOAD Feb 9 10:26:41.849000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.851000 audit: BPF prog-id=40 op=LOAD Feb 9 10:26:41.851000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit: BPF prog-id=41 op=LOAD Feb 9 10:26:41.854000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit: BPF prog-id=42 op=LOAD Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit: BPF prog-id=43 op=LOAD Feb 9 10:26:41.854000 audit: BPF prog-id=33 op=UNLOAD Feb 9 10:26:41.854000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit: BPF prog-id=44 op=LOAD Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.854000 audit: BPF prog-id=45 op=LOAD Feb 9 10:26:41.854000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:26:41.854000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit: BPF prog-id=46 op=LOAD Feb 9 10:26:41.855000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit: BPF prog-id=47 op=LOAD Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.855000 audit: BPF prog-id=48 op=LOAD Feb 9 10:26:41.855000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:26:41.855000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit: BPF prog-id=49 op=LOAD Feb 9 10:26:41.856000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit: BPF prog-id=50 op=LOAD Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:41.856000 audit: BPF prog-id=51 op=LOAD Feb 9 10:26:41.856000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:26:41.856000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:26:41.861924 systemd[1]: Started kubelet.service. Feb 9 10:26:41.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:42.012827 kubelet[1470]: E0209 10:26:42.012764 1470 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:26:42.015160 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:26:42.015281 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:26:42.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:42.238062 env[1140]: time="2024-02-09T10:26:42.237942694Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 10:26:43.021180 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1180056981.mount: Deactivated successfully. Feb 9 10:26:44.511624 env[1140]: time="2024-02-09T10:26:44.511536743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:44.514096 env[1140]: time="2024-02-09T10:26:44.514057398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:44.516113 env[1140]: time="2024-02-09T10:26:44.516078403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:44.517880 env[1140]: time="2024-02-09T10:26:44.517848147Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:44.519412 env[1140]: time="2024-02-09T10:26:44.519382937Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 10:26:44.528910 env[1140]: time="2024-02-09T10:26:44.528873302Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 10:26:47.866296 env[1140]: time="2024-02-09T10:26:47.866217926Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:47.868782 env[1140]: time="2024-02-09T10:26:47.868742620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:47.870255 env[1140]: time="2024-02-09T10:26:47.870232059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:47.872417 env[1140]: time="2024-02-09T10:26:47.872386778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:47.873150 env[1140]: time="2024-02-09T10:26:47.873118057Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 10:26:47.884203 env[1140]: time="2024-02-09T10:26:47.884178805Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 10:26:49.110897 env[1140]: time="2024-02-09T10:26:49.110844353Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:49.112282 env[1140]: time="2024-02-09T10:26:49.112252155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:49.114254 env[1140]: time="2024-02-09T10:26:49.114206837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:49.115921 env[1140]: time="2024-02-09T10:26:49.115885143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:49.117411 env[1140]: time="2024-02-09T10:26:49.117366404Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 10:26:49.126500 env[1140]: time="2024-02-09T10:26:49.126476258Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 10:26:50.192894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3712879906.mount: Deactivated successfully. Feb 9 10:26:51.509150 env[1140]: time="2024-02-09T10:26:51.509096102Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.510561 env[1140]: time="2024-02-09T10:26:51.510532194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.512211 env[1140]: time="2024-02-09T10:26:51.512185735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.513632 env[1140]: time="2024-02-09T10:26:51.513595347Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.514107 env[1140]: time="2024-02-09T10:26:51.514077755Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 10:26:51.522769 env[1140]: time="2024-02-09T10:26:51.522742341Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 10:26:51.970135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3088720700.mount: Deactivated successfully. Feb 9 10:26:51.974018 env[1140]: time="2024-02-09T10:26:51.973988740Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.975370 env[1140]: time="2024-02-09T10:26:51.975331238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.976805 env[1140]: time="2024-02-09T10:26:51.976780570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.978101 env[1140]: time="2024-02-09T10:26:51.978068477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:51.978726 env[1140]: time="2024-02-09T10:26:51.978695652Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 10:26:51.986629 env[1140]: time="2024-02-09T10:26:51.986593942Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 10:26:52.030439 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 10:26:52.030586 systemd[1]: Stopped kubelet.service. Feb 9 10:26:52.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:52.031921 systemd[1]: Started kubelet.service. Feb 9 10:26:52.032883 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 10:26:52.032938 kernel: audit: type=1130 audit(1707474412.029:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:52.032958 kernel: audit: type=1131 audit(1707474412.029:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:52.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:52.034628 kernel: audit: type=1130 audit(1707474412.030:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:52.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:52.070895 kubelet[1528]: E0209 10:26:52.070854 1528 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:26:52.074218 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:26:52.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:52.074336 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:26:52.076371 kernel: audit: type=1131 audit(1707474412.074:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:52.810174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4168705014.mount: Deactivated successfully. Feb 9 10:26:54.833310 env[1140]: time="2024-02-09T10:26:54.833253992Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:54.837078 env[1140]: time="2024-02-09T10:26:54.837048321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:54.838902 env[1140]: time="2024-02-09T10:26:54.838865667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:54.840133 env[1140]: time="2024-02-09T10:26:54.840096062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:54.840944 env[1140]: time="2024-02-09T10:26:54.840900417Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 10:26:54.849071 env[1140]: time="2024-02-09T10:26:54.849042442Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 10:26:55.441907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1774933060.mount: Deactivated successfully. Feb 9 10:26:55.925842 env[1140]: time="2024-02-09T10:26:55.925786489Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:55.927250 env[1140]: time="2024-02-09T10:26:55.927208511Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:55.928625 env[1140]: time="2024-02-09T10:26:55.928589836Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:55.930083 env[1140]: time="2024-02-09T10:26:55.930047173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:55.930768 env[1140]: time="2024-02-09T10:26:55.930734228Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 10:27:01.090466 systemd[1]: Stopped kubelet.service. Feb 9 10:27:01.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:01.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:01.094611 kernel: audit: type=1130 audit(1707474421.089:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:01.094669 kernel: audit: type=1131 audit(1707474421.089:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:01.103626 systemd[1]: Reloading. Feb 9 10:27:01.154483 /usr/lib/systemd/system-generators/torcx-generator[1634]: time="2024-02-09T10:27:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:27:01.154777 /usr/lib/systemd/system-generators/torcx-generator[1634]: time="2024-02-09T10:27:01Z" level=info msg="torcx already run" Feb 9 10:27:01.208982 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:27:01.208998 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:27:01.223761 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:27:01.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.274073 kernel: audit: type=1400 audit(1707474421.269:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.274136 kernel: audit: type=1400 audit(1707474421.270:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.274158 kernel: audit: type=1400 audit(1707474421.270:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277356 kernel: audit: type=1400 audit(1707474421.270:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277413 kernel: audit: type=1400 audit(1707474421.270:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279012 kernel: audit: type=1400 audit(1707474421.270:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.280667 kernel: audit: type=1400 audit(1707474421.270:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.282312 kernel: audit: type=1400 audit(1707474421.270:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit: BPF prog-id=52 op=LOAD Feb 9 10:27:01.271000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit: BPF prog-id=53 op=LOAD Feb 9 10:27:01.273000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit: BPF prog-id=54 op=LOAD Feb 9 10:27:01.275000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.276000 audit: BPF prog-id=55 op=LOAD Feb 9 10:27:01.276000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit: BPF prog-id=56 op=LOAD Feb 9 10:27:01.279000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.281000 audit: BPF prog-id=57 op=LOAD Feb 9 10:27:01.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit: BPF prog-id=58 op=LOAD Feb 9 10:27:01.284000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:27:01.284000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit: BPF prog-id=59 op=LOAD Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit: BPF prog-id=60 op=LOAD Feb 9 10:27:01.285000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:27:01.285000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit: BPF prog-id=61 op=LOAD Feb 9 10:27:01.285000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit: BPF prog-id=62 op=LOAD Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.285000 audit: BPF prog-id=63 op=LOAD Feb 9 10:27:01.285000 audit: BPF prog-id=47 op=UNLOAD Feb 9 10:27:01.285000 audit: BPF prog-id=48 op=UNLOAD Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit: BPF prog-id=64 op=LOAD Feb 9 10:27:01.286000 audit: BPF prog-id=49 op=UNLOAD Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit: BPF prog-id=65 op=LOAD Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.287000 audit: BPF prog-id=66 op=LOAD Feb 9 10:27:01.287000 audit: BPF prog-id=50 op=UNLOAD Feb 9 10:27:01.287000 audit: BPF prog-id=51 op=UNLOAD Feb 9 10:27:01.297226 systemd[1]: Started kubelet.service. Feb 9 10:27:01.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:01.336789 kubelet[1672]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:27:01.336789 kubelet[1672]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:27:01.337066 kubelet[1672]: I0209 10:27:01.336906 1672 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:27:01.338032 kubelet[1672]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:27:01.338032 kubelet[1672]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:27:01.981907 kubelet[1672]: I0209 10:27:01.981883 1672 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:27:01.981907 kubelet[1672]: I0209 10:27:01.981906 1672 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:27:01.982079 kubelet[1672]: I0209 10:27:01.982063 1672 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:27:01.986018 kubelet[1672]: I0209 10:27:01.986001 1672 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:27:01.986528 kubelet[1672]: E0209 10:27:01.986511 1672 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.3:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:01.988075 kubelet[1672]: W0209 10:27:01.988057 1672 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:27:01.988825 kubelet[1672]: I0209 10:27:01.988805 1672 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:27:01.989194 kubelet[1672]: I0209 10:27:01.989177 1672 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:27:01.989253 kubelet[1672]: I0209 10:27:01.989244 1672 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:27:01.989330 kubelet[1672]: I0209 10:27:01.989324 1672 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:27:01.989370 kubelet[1672]: I0209 10:27:01.989336 1672 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:27:01.989527 kubelet[1672]: I0209 10:27:01.989503 1672 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:27:01.993248 kubelet[1672]: I0209 10:27:01.993225 1672 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:27:01.993248 kubelet[1672]: I0209 10:27:01.993246 1672 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:27:01.993534 kubelet[1672]: I0209 10:27:01.993515 1672 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:27:01.993534 kubelet[1672]: I0209 10:27:01.993534 1672 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:27:01.994651 kubelet[1672]: I0209 10:27:01.994626 1672 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:27:01.994685 kubelet[1672]: W0209 10:27:01.994633 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:01.994685 kubelet[1672]: E0209 10:27:01.994677 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:01.994745 kubelet[1672]: W0209 10:27:01.994719 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.3:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:01.994745 kubelet[1672]: E0209 10:27:01.994740 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.3:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:01.995553 kubelet[1672]: W0209 10:27:01.995532 1672 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:27:01.996322 kubelet[1672]: I0209 10:27:01.996279 1672 server.go:1186] "Started kubelet" Feb 9 10:27:01.997000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.997000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:01.997000 audit[1672]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cb4bd0 a1=400072b860 a2=4000cb4ba0 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.997000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:01.999512 kubelet[1672]: I0209 10:27:01.999263 1672 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:27:01.999610 kubelet[1672]: I0209 10:27:01.999595 1672 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:27:01.998000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.998000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:01.998000 audit[1672]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cc2c60 a1=4000059518 a2=4000c3aab0 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.998000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:02.000085 kubelet[1672]: I0209 10:27:02.000068 1672 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:27:02.000242 kubelet[1672]: I0209 10:27:02.000227 1672 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:27:02.000632 kubelet[1672]: E0209 10:27:02.000609 1672 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:27:02.000632 kubelet[1672]: E0209 10:27:02.000634 1672 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:27:02.000935 kubelet[1672]: E0209 10:27:01.999778 1672 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b22af0b22706ef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 1, 996259055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 1, 996259055, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.3:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.3:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:27:02.001040 kubelet[1672]: I0209 10:27:02.001020 1672 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:27:02.002632 kubelet[1672]: I0209 10:27:02.002610 1672 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:27:02.002696 kubelet[1672]: I0209 10:27:02.002669 1672 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:27:02.003138 kubelet[1672]: W0209 10:27:02.003084 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.003138 kubelet[1672]: E0209 10:27:02.003136 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.004138 kubelet[1672]: E0209 10:27:02.004078 1672 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.003000 audit[1684]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.003000 audit[1684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd5b3acb0 a2=0 a3=1 items=0 ppid=1672 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:27:02.004000 audit[1685]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.004000 audit[1685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffede554c0 a2=0 a3=1 items=0 ppid=1672 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:27:02.005000 audit[1687]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.005000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdf0ca580 a2=0 a3=1 items=0 ppid=1672 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:27:02.006000 audit[1689]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.006000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdff45340 a2=0 a3=1 items=0 ppid=1672 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:27:02.011000 audit[1692]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.011000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd425c1d0 a2=0 a3=1 items=0 ppid=1672 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:27:02.012000 audit[1693]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.012000 audit[1693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdf41b550 a2=0 a3=1 items=0 ppid=1672 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:27:02.017000 audit[1700]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.017000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff4ecc400 a2=0 a3=1 items=0 ppid=1672 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:27:02.020437 kubelet[1672]: I0209 10:27:02.020423 1672 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:27:02.020521 kubelet[1672]: I0209 10:27:02.020511 1672 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:27:02.020593 kubelet[1672]: I0209 10:27:02.020584 1672 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:27:02.022780 kubelet[1672]: I0209 10:27:02.022761 1672 policy_none.go:49] "None policy: Start" Feb 9 10:27:02.021000 audit[1705]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.021000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffff8388d0 a2=0 a3=1 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:27:02.023457 kubelet[1672]: I0209 10:27:02.023374 1672 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:27:02.023457 kubelet[1672]: I0209 10:27:02.023397 1672 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:27:02.022000 audit[1706]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.022000 audit[1706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd5dead90 a2=0 a3=1 items=0 ppid=1672 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:27:02.023000 audit[1707]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.023000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde0dfce0 a2=0 a3=1 items=0 ppid=1672 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:27:02.025000 audit[1709]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.025000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffabf23c0 a2=0 a3=1 items=0 ppid=1672 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:27:02.028433 systemd[1]: Created slice kubepods.slice. Feb 9 10:27:02.029000 audit[1711]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.029000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc7133c50 a2=0 a3=1 items=0 ppid=1672 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:27:02.031685 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:27:02.032000 audit[1713]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.032000 audit[1713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffd8e034f0 a2=0 a3=1 items=0 ppid=1672 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:27:02.034514 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:27:02.035000 audit[1715]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.035000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffc507d4b0 a2=0 a3=1 items=0 ppid=1672 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:27:02.036000 audit[1717]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.036000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffdad07dd0 a2=0 a3=1 items=0 ppid=1672 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:27:02.038393 kubelet[1672]: I0209 10:27:02.038378 1672 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:27:02.037000 audit[1718]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.037000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd2ee12d0 a2=0 a3=1 items=0 ppid=1672 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:27:02.038000 audit[1719]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.038000 audit[1719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe659c710 a2=0 a3=1 items=0 ppid=1672 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:27:02.038000 audit[1720]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.038000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc692d990 a2=0 a3=1 items=0 ppid=1672 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:27:02.039988 kubelet[1672]: I0209 10:27:02.039952 1672 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:27:02.038000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:02.038000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:02.038000 audit[1672]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000fd8810 a1=4000fbba40 a2=4000fd87e0 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.038000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:02.040152 kubelet[1672]: I0209 10:27:02.040012 1672 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:27:02.040177 kubelet[1672]: I0209 10:27:02.040154 1672 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:27:02.039000 audit[1721]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.039000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd3e1ef0 a2=0 a3=1 items=0 ppid=1672 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:27:02.040000 audit[1723]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:02.040000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7f88e50 a2=0 a3=1 items=0 ppid=1672 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:27:02.042117 kubelet[1672]: E0209 10:27:02.042087 1672 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 9 10:27:02.040000 audit[1724]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.040000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd5eb58a0 a2=0 a3=1 items=0 ppid=1672 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:27:02.041000 audit[1725]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.041000 audit[1725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc3938890 a2=0 a3=1 items=0 ppid=1672 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:27:02.043000 audit[1727]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.043000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc63f5b10 a2=0 a3=1 items=0 ppid=1672 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:27:02.044000 audit[1728]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.044000 audit[1728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff2157580 a2=0 a3=1 items=0 ppid=1672 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:27:02.045000 audit[1729]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.045000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5dd53b0 a2=0 a3=1 items=0 ppid=1672 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:27:02.046000 audit[1731]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.046000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcee14740 a2=0 a3=1 items=0 ppid=1672 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:27:02.048000 audit[1733]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.048000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd688cb10 a2=0 a3=1 items=0 ppid=1672 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:27:02.049000 audit[1735]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.049000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffff0c6b1a0 a2=0 a3=1 items=0 ppid=1672 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:27:02.051000 audit[1737]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.051000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffce781670 a2=0 a3=1 items=0 ppid=1672 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:27:02.054000 audit[1739]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.054000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffff98a7db0 a2=0 a3=1 items=0 ppid=1672 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:27:02.056440 kubelet[1672]: I0209 10:27:02.056424 1672 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:27:02.056519 kubelet[1672]: I0209 10:27:02.056509 1672 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:27:02.056580 kubelet[1672]: I0209 10:27:02.056570 1672 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:27:02.056674 kubelet[1672]: E0209 10:27:02.056663 1672 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 10:27:02.056951 kubelet[1672]: W0209 10:27:02.056861 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.057002 kubelet[1672]: E0209 10:27:02.056978 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.056000 audit[1740]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.056000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3cd4a50 a2=0 a3=1 items=0 ppid=1672 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:27:02.057000 audit[1741]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.057000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcc2edc0 a2=0 a3=1 items=0 ppid=1672 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:27:02.057000 audit[1742]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:02.057000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8ef0610 a2=0 a3=1 items=0 ppid=1672 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:02.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:27:02.103378 kubelet[1672]: I0209 10:27:02.103344 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:27:02.103722 kubelet[1672]: E0209 10:27:02.103702 1672 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.3:6443/api/v1/nodes\": dial tcp 10.0.0.3:6443: connect: connection refused" node="localhost" Feb 9 10:27:02.157817 kubelet[1672]: I0209 10:27:02.157788 1672 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:02.158669 kubelet[1672]: I0209 10:27:02.158641 1672 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:02.159250 kubelet[1672]: I0209 10:27:02.159230 1672 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:02.159957 kubelet[1672]: I0209 10:27:02.159926 1672 status_manager.go:698] "Failed to get status for pod" podUID=1fc41d00c97d14805f04285707cfaa25 pod="kube-system/kube-apiserver-localhost" err="Get \"https://10.0.0.3:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-localhost\": dial tcp 10.0.0.3:6443: connect: connection refused" Feb 9 10:27:02.160362 kubelet[1672]: I0209 10:27:02.160314 1672 status_manager.go:698] "Failed to get status for pod" podUID=550020dd9f101bcc23e1d3c651841c4d pod="kube-system/kube-controller-manager-localhost" err="Get \"https://10.0.0.3:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-localhost\": dial tcp 10.0.0.3:6443: connect: connection refused" Feb 9 10:27:02.161487 kubelet[1672]: I0209 10:27:02.161465 1672 status_manager.go:698] "Failed to get status for pod" podUID=72ae17a74a2eae76daac6d298477aff0 pod="kube-system/kube-scheduler-localhost" err="Get \"https://10.0.0.3:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-localhost\": dial tcp 10.0.0.3:6443: connect: connection refused" Feb 9 10:27:02.163645 systemd[1]: Created slice kubepods-burstable-pod550020dd9f101bcc23e1d3c651841c4d.slice. Feb 9 10:27:02.176419 systemd[1]: Created slice kubepods-burstable-pod1fc41d00c97d14805f04285707cfaa25.slice. Feb 9 10:27:02.179766 systemd[1]: Created slice kubepods-burstable-pod72ae17a74a2eae76daac6d298477aff0.slice. Feb 9 10:27:02.205422 kubelet[1672]: E0209 10:27:02.205391 1672 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.303818 kubelet[1672]: I0209 10:27:02.303775 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:02.303818 kubelet[1672]: I0209 10:27:02.303819 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:02.303934 kubelet[1672]: I0209 10:27:02.303839 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:02.303934 kubelet[1672]: I0209 10:27:02.303869 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:02.303934 kubelet[1672]: I0209 10:27:02.303889 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:02.303934 kubelet[1672]: I0209 10:27:02.303907 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:02.303934 kubelet[1672]: I0209 10:27:02.303935 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:02.304067 kubelet[1672]: I0209 10:27:02.303956 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:02.304067 kubelet[1672]: I0209 10:27:02.303976 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72ae17a74a2eae76daac6d298477aff0-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"72ae17a74a2eae76daac6d298477aff0\") " pod="kube-system/kube-scheduler-localhost" Feb 9 10:27:02.304924 kubelet[1672]: I0209 10:27:02.304902 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:27:02.305149 kubelet[1672]: E0209 10:27:02.305125 1672 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.3:6443/api/v1/nodes\": dial tcp 10.0.0.3:6443: connect: connection refused" node="localhost" Feb 9 10:27:02.475117 kubelet[1672]: E0209 10:27:02.475045 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:02.476000 env[1140]: time="2024-02-09T10:27:02.475921928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:550020dd9f101bcc23e1d3c651841c4d,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:02.479140 kubelet[1672]: E0209 10:27:02.479107 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:02.479517 env[1140]: time="2024-02-09T10:27:02.479463111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1fc41d00c97d14805f04285707cfaa25,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:02.481785 kubelet[1672]: E0209 10:27:02.481756 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:02.482084 env[1140]: time="2024-02-09T10:27:02.482046020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:72ae17a74a2eae76daac6d298477aff0,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:02.528326 kubelet[1672]: E0209 10:27:02.528235 1672 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b22af0b22706ef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 27, 1, 996259055, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 27, 1, 996259055, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.3:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.3:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:27:02.606864 kubelet[1672]: E0209 10:27:02.606778 1672 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.706040 kubelet[1672]: I0209 10:27:02.706013 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:27:02.706276 kubelet[1672]: E0209 10:27:02.706261 1672 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.3:6443/api/v1/nodes\": dial tcp 10.0.0.3:6443: connect: connection refused" node="localhost" Feb 9 10:27:02.841425 kubelet[1672]: W0209 10:27:02.841398 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.841546 kubelet[1672]: E0209 10:27:02.841534 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.962412 kubelet[1672]: W0209 10:27:02.962327 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.962412 kubelet[1672]: E0209 10:27:02.962380 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:02.999240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount886310785.mount: Deactivated successfully. Feb 9 10:27:03.003934 env[1140]: time="2024-02-09T10:27:03.003886984Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.005546 env[1140]: time="2024-02-09T10:27:03.005518051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.006394 env[1140]: time="2024-02-09T10:27:03.006369700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.007358 env[1140]: time="2024-02-09T10:27:03.007331257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.008918 env[1140]: time="2024-02-09T10:27:03.008892089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.011915 env[1140]: time="2024-02-09T10:27:03.011870845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.012575 env[1140]: time="2024-02-09T10:27:03.012551382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.015152 env[1140]: time="2024-02-09T10:27:03.015117078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.016845 env[1140]: time="2024-02-09T10:27:03.016798523Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.018810 env[1140]: time="2024-02-09T10:27:03.018784561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.019803 env[1140]: time="2024-02-09T10:27:03.019776600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.020607 env[1140]: time="2024-02-09T10:27:03.020557815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.056188 env[1140]: time="2024-02-09T10:27:03.056111842Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:03.056188 env[1140]: time="2024-02-09T10:27:03.056148357Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:03.056188 env[1140]: time="2024-02-09T10:27:03.056158745Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:03.056438 env[1140]: time="2024-02-09T10:27:03.056388027Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f71ea32b1f1f57070cb45bcc4fdd42004e78ed76b71e95644dc582f355f52c1 pid=1763 runtime=io.containerd.runc.v2 Feb 9 10:27:03.056649 env[1140]: time="2024-02-09T10:27:03.056599611Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:03.056649 env[1140]: time="2024-02-09T10:27:03.056631613Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:03.056649 env[1140]: time="2024-02-09T10:27:03.056641521Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:03.056857 env[1140]: time="2024-02-09T10:27:03.056821903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/912e4940f16d7463e2524340d3b9ca1542dbf6166a7cf4f718a28650a6dc2f07 pid=1764 runtime=io.containerd.runc.v2 Feb 9 10:27:03.057267 env[1140]: time="2024-02-09T10:27:03.057108835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:03.057267 env[1140]: time="2024-02-09T10:27:03.057147988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:03.057267 env[1140]: time="2024-02-09T10:27:03.057158535Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:03.057402 env[1140]: time="2024-02-09T10:27:03.057302801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55f6d120bfed41ff206017cadf38af4fb5e76e3311c8c74f8d16590c872028e5 pid=1767 runtime=io.containerd.runc.v2 Feb 9 10:27:03.058109 kubelet[1672]: W0209 10:27:03.058020 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:03.058109 kubelet[1672]: E0209 10:27:03.058087 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:03.069989 systemd[1]: Started cri-containerd-912e4940f16d7463e2524340d3b9ca1542dbf6166a7cf4f718a28650a6dc2f07.scope. Feb 9 10:27:03.072365 systemd[1]: Started cri-containerd-55f6d120bfed41ff206017cadf38af4fb5e76e3311c8c74f8d16590c872028e5.scope. Feb 9 10:27:03.078831 systemd[1]: Started cri-containerd-4f71ea32b1f1f57070cb45bcc4fdd42004e78ed76b71e95644dc582f355f52c1.scope. Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.101000 audit: BPF prog-id=67 op=LOAD Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1764 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931326534393430663136643734363365323532343334306433623963 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1764 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931326534393430663136643734363365323532343334306433623963 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit: BPF prog-id=68 op=LOAD Feb 9 10:27:03.103000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1764 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931326534393430663136643734363365323532343334306433623963 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit: BPF prog-id=69 op=LOAD Feb 9 10:27:03.103000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1764 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931326534393430663136643734363365323532343334306433623963 Feb 9 10:27:03.103000 audit: BPF prog-id=69 op=UNLOAD Feb 9 10:27:03.103000 audit: BPF prog-id=68 op=UNLOAD Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.103000 audit: BPF prog-id=70 op=LOAD Feb 9 10:27:03.103000 audit[1794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1764 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931326534393430663136643734363365323532343334306433623963 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit: BPF prog-id=71 op=LOAD Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000245b38 a2=10 a3=0 items=0 ppid=1767 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663664313230626665643431666632303630313763616466333861 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002455a0 a2=3c a3=0 items=0 ppid=1767 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663664313230626665643431666632303630313763616466333861 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit: BPF prog-id=72 op=LOAD Feb 9 10:27:03.106000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002458e0 a2=78 a3=0 items=0 ppid=1767 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663664313230626665643431666632303630313763616466333861 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit: BPF prog-id=73 op=LOAD Feb 9 10:27:03.106000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000245670 a2=78 a3=0 items=0 ppid=1767 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663664313230626665643431666632303630313763616466333861 Feb 9 10:27:03.106000 audit: BPF prog-id=73 op=UNLOAD Feb 9 10:27:03.106000 audit: BPF prog-id=72 op=UNLOAD Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.106000 audit: BPF prog-id=74 op=LOAD Feb 9 10:27:03.106000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000245b40 a2=78 a3=0 items=0 ppid=1767 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663664313230626665643431666632303630313763616466333861 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.109000 audit: BPF prog-id=75 op=LOAD Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1763 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373165613332623166316635373037306362343562636334666464 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1763 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373165613332623166316635373037306362343562636334666464 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit: BPF prog-id=76 op=LOAD Feb 9 10:27:03.110000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1763 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373165613332623166316635373037306362343562636334666464 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit: BPF prog-id=77 op=LOAD Feb 9 10:27:03.110000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1763 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373165613332623166316635373037306362343562636334666464 Feb 9 10:27:03.110000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:27:03.110000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.110000 audit: BPF prog-id=78 op=LOAD Feb 9 10:27:03.110000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1763 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373165613332623166316635373037306362343562636334666464 Feb 9 10:27:03.127895 env[1140]: time="2024-02-09T10:27:03.127856883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:72ae17a74a2eae76daac6d298477aff0,Namespace:kube-system,Attempt:0,} returns sandbox id \"55f6d120bfed41ff206017cadf38af4fb5e76e3311c8c74f8d16590c872028e5\"" Feb 9 10:27:03.130075 kubelet[1672]: E0209 10:27:03.130046 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:03.138050 env[1140]: time="2024-02-09T10:27:03.138017151Z" level=info msg="CreateContainer within sandbox \"55f6d120bfed41ff206017cadf38af4fb5e76e3311c8c74f8d16590c872028e5\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 10:27:03.139249 env[1140]: time="2024-02-09T10:27:03.139194687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:550020dd9f101bcc23e1d3c651841c4d,Namespace:kube-system,Attempt:0,} returns sandbox id \"912e4940f16d7463e2524340d3b9ca1542dbf6166a7cf4f718a28650a6dc2f07\"" Feb 9 10:27:03.139905 kubelet[1672]: E0209 10:27:03.139881 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:03.141368 env[1140]: time="2024-02-09T10:27:03.141307251Z" level=info msg="CreateContainer within sandbox \"912e4940f16d7463e2524340d3b9ca1542dbf6166a7cf4f718a28650a6dc2f07\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 10:27:03.148789 env[1140]: time="2024-02-09T10:27:03.148745332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1fc41d00c97d14805f04285707cfaa25,Namespace:kube-system,Attempt:0,} returns sandbox id \"4f71ea32b1f1f57070cb45bcc4fdd42004e78ed76b71e95644dc582f355f52c1\"" Feb 9 10:27:03.149230 kubelet[1672]: E0209 10:27:03.149202 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:03.150962 env[1140]: time="2024-02-09T10:27:03.150899446Z" level=info msg="CreateContainer within sandbox \"4f71ea32b1f1f57070cb45bcc4fdd42004e78ed76b71e95644dc582f355f52c1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 10:27:03.153781 env[1140]: time="2024-02-09T10:27:03.153737373Z" level=info msg="CreateContainer within sandbox \"55f6d120bfed41ff206017cadf38af4fb5e76e3311c8c74f8d16590c872028e5\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7e8c78344c307dd30ebe05f8ee32b536052552f1b8519ae7eb9593dc207f4753\"" Feb 9 10:27:03.154587 env[1140]: time="2024-02-09T10:27:03.154555503Z" level=info msg="StartContainer for \"7e8c78344c307dd30ebe05f8ee32b536052552f1b8519ae7eb9593dc207f4753\"" Feb 9 10:27:03.159633 env[1140]: time="2024-02-09T10:27:03.159601638Z" level=info msg="CreateContainer within sandbox \"912e4940f16d7463e2524340d3b9ca1542dbf6166a7cf4f718a28650a6dc2f07\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5072591ad6afe67715e5ca02667b2182edb59e964dcd7a9bf9b346f8ca0d7e2d\"" Feb 9 10:27:03.160068 env[1140]: time="2024-02-09T10:27:03.160040707Z" level=info msg="StartContainer for \"5072591ad6afe67715e5ca02667b2182edb59e964dcd7a9bf9b346f8ca0d7e2d\"" Feb 9 10:27:03.164736 env[1140]: time="2024-02-09T10:27:03.164689163Z" level=info msg="CreateContainer within sandbox \"4f71ea32b1f1f57070cb45bcc4fdd42004e78ed76b71e95644dc582f355f52c1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c3ab6e43de9d3ce363a5cd6b7f7496fd80f9dfec829f29601b84a371379743e0\"" Feb 9 10:27:03.165088 env[1140]: time="2024-02-09T10:27:03.165054881Z" level=info msg="StartContainer for \"c3ab6e43de9d3ce363a5cd6b7f7496fd80f9dfec829f29601b84a371379743e0\"" Feb 9 10:27:03.172588 systemd[1]: Started cri-containerd-7e8c78344c307dd30ebe05f8ee32b536052552f1b8519ae7eb9593dc207f4753.scope. Feb 9 10:27:03.190736 systemd[1]: Started cri-containerd-5072591ad6afe67715e5ca02667b2182edb59e964dcd7a9bf9b346f8ca0d7e2d.scope. Feb 9 10:27:03.191485 systemd[1]: Started cri-containerd-c3ab6e43de9d3ce363a5cd6b7f7496fd80f9dfec829f29601b84a371379743e0.scope. Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.209000 audit: BPF prog-id=79 op=LOAD Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1764 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373235393161643661666536373731356535636130323636376232 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1764 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373235393161643661666536373731356535636130323636376232 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit: BPF prog-id=80 op=LOAD Feb 9 10:27:03.210000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1764 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373235393161643661666536373731356535636130323636376232 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit: BPF prog-id=81 op=LOAD Feb 9 10:27:03.210000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1764 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373235393161643661666536373731356535636130323636376232 Feb 9 10:27:03.210000 audit: BPF prog-id=81 op=UNLOAD Feb 9 10:27:03.210000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.210000 audit: BPF prog-id=82 op=LOAD Feb 9 10:27:03.210000 audit[1890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1764 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373235393161643661666536373731356535636130323636376232 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit: BPF prog-id=83 op=LOAD Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1763 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333616236653433646539643363653336336135636436623766373439 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1763 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333616236653433646539643363653336336135636436623766373439 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit: BPF prog-id=84 op=LOAD Feb 9 10:27:03.219000 audit[1909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1763 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333616236653433646539643363653336336135636436623766373439 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit: BPF prog-id=85 op=LOAD Feb 9 10:27:03.219000 audit[1909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1763 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333616236653433646539643363653336336135636436623766373439 Feb 9 10:27:03.219000 audit: BPF prog-id=85 op=UNLOAD Feb 9 10:27:03.219000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.219000 audit: BPF prog-id=86 op=LOAD Feb 9 10:27:03.219000 audit[1909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1763 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333616236653433646539643363653336336135636436623766373439 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.223000 audit: BPF prog-id=87 op=LOAD Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1767 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386337383334346333303764643330656265303566386565333262 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1767 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386337383334346333303764643330656265303566386565333262 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit: BPF prog-id=88 op=LOAD Feb 9 10:27:03.224000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1767 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386337383334346333303764643330656265303566386565333262 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit: BPF prog-id=89 op=LOAD Feb 9 10:27:03.224000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1767 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386337383334346333303764643330656265303566386565333262 Feb 9 10:27:03.224000 audit: BPF prog-id=89 op=UNLOAD Feb 9 10:27:03.224000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:03.224000 audit: BPF prog-id=90 op=LOAD Feb 9 10:27:03.224000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1767 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:03.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765386337383334346333303764643330656265303566386565333262 Feb 9 10:27:03.260250 env[1140]: time="2024-02-09T10:27:03.260108843Z" level=info msg="StartContainer for \"5072591ad6afe67715e5ca02667b2182edb59e964dcd7a9bf9b346f8ca0d7e2d\" returns successfully" Feb 9 10:27:03.260660 env[1140]: time="2024-02-09T10:27:03.260608119Z" level=info msg="StartContainer for \"c3ab6e43de9d3ce363a5cd6b7f7496fd80f9dfec829f29601b84a371379743e0\" returns successfully" Feb 9 10:27:03.262527 env[1140]: time="2024-02-09T10:27:03.262491201Z" level=info msg="StartContainer for \"7e8c78344c307dd30ebe05f8ee32b536052552f1b8519ae7eb9593dc207f4753\" returns successfully" Feb 9 10:27:03.407618 kubelet[1672]: E0209 10:27:03.407569 1672 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 9 10:27:03.508115 kubelet[1672]: I0209 10:27:03.508027 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:27:04.062969 kubelet[1672]: E0209 10:27:04.062943 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:04.065362 kubelet[1672]: E0209 10:27:04.065328 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:04.066265 kubelet[1672]: E0209 10:27:04.066242 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:05.068638 kubelet[1672]: E0209 10:27:05.068592 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:05.069180 kubelet[1672]: E0209 10:27:05.069148 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:05.069544 kubelet[1672]: E0209 10:27:05.069521 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:05.193000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:05.193000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:05.193000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400031e980 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:27:05.193000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=4002d181b0 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:27:05.193000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:27:05.193000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:27:05.194000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6489 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:05.194000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400570a570 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:27:05.194000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:27:05.195000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:05.195000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40018ac9c0 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:27:05.195000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:27:05.196000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:05.196000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400570afc0 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:27:05.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:27:05.202000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6495 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:05.202000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=55 a1=400570bc80 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:27:05.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:27:05.258697 kubelet[1672]: E0209 10:27:05.258650 1672 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 9 10:27:05.329104 kubelet[1672]: I0209 10:27:05.328912 1672 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 10:27:05.996166 kubelet[1672]: I0209 10:27:05.996135 1672 apiserver.go:52] "Watching apiserver" Feb 9 10:27:06.003542 kubelet[1672]: I0209 10:27:06.003517 1672 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:27:06.025687 kubelet[1672]: I0209 10:27:06.025668 1672 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:27:06.199276 kubelet[1672]: E0209 10:27:06.199240 1672 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:06.199727 kubelet[1672]: E0209 10:27:06.199705 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:06.291000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:06.295540 kernel: kauditd_printk_skb: 646 callbacks suppressed Feb 9 10:27:06.295634 kernel: audit: type=1400 audit(1707474426.291:710): avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:06.295672 kernel: audit: type=1300 audit(1707474426.291:710): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40012ba020 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:06.291000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40012ba020 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:06.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:06.301086 kernel: audit: type=1327 audit(1707474426.291:710): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:06.299000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:06.303721 kernel: audit: type=1400 audit(1707474426.299:711): avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:06.299000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f0c000 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:06.308657 kernel: audit: type=1300 audit(1707474426.299:711): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f0c000 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:06.308732 kernel: audit: type=1327 audit(1707474426.299:711): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:06.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:07.871718 systemd[1]: Reloading. Feb 9 10:27:07.918915 /usr/lib/systemd/system-generators/torcx-generator[2001]: time="2024-02-09T10:27:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:27:07.918947 /usr/lib/systemd/system-generators/torcx-generator[2001]: time="2024-02-09T10:27:07Z" level=info msg="torcx already run" Feb 9 10:27:07.967728 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:27:07.967745 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:27:07.982703 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:27:08.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043574 kernel: audit: type=1400 audit(1707474428.038:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043612 kernel: audit: type=1400 audit(1707474428.039:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043634 kernel: audit: type=1400 audit(1707474428.039:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045268 kernel: audit: type=1400 audit(1707474428.039:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit: BPF prog-id=91 op=LOAD Feb 9 10:27:08.041000 audit: BPF prog-id=52 op=UNLOAD Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit: BPF prog-id=92 op=LOAD Feb 9 10:27:08.043000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit: BPF prog-id=93 op=LOAD Feb 9 10:27:08.044000 audit: BPF prog-id=87 op=UNLOAD Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit: BPF prog-id=94 op=LOAD Feb 9 10:27:08.045000 audit: BPF prog-id=53 op=UNLOAD Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit: BPF prog-id=95 op=LOAD Feb 9 10:27:08.046000 audit: BPF prog-id=54 op=UNLOAD Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.046000 audit: BPF prog-id=96 op=LOAD Feb 9 10:27:08.046000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.047000 audit: BPF prog-id=97 op=LOAD Feb 9 10:27:08.047000 audit: BPF prog-id=71 op=UNLOAD Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.048000 audit: BPF prog-id=98 op=LOAD Feb 9 10:27:08.048000 audit: BPF prog-id=55 op=UNLOAD Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit: BPF prog-id=99 op=LOAD Feb 9 10:27:08.049000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.050000 audit: BPF prog-id=100 op=LOAD Feb 9 10:27:08.050000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit: BPF prog-id=101 op=LOAD Feb 9 10:27:08.051000 audit: BPF prog-id=56 op=UNLOAD Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit: BPF prog-id=102 op=LOAD Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit: BPF prog-id=103 op=LOAD Feb 9 10:27:08.051000 audit: BPF prog-id=57 op=UNLOAD Feb 9 10:27:08.051000 audit: BPF prog-id=58 op=UNLOAD Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit: BPF prog-id=104 op=LOAD Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit: BPF prog-id=105 op=LOAD Feb 9 10:27:08.051000 audit: BPF prog-id=59 op=UNLOAD Feb 9 10:27:08.051000 audit: BPF prog-id=60 op=UNLOAD Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit: BPF prog-id=106 op=LOAD Feb 9 10:27:08.052000 audit: BPF prog-id=61 op=UNLOAD Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit: BPF prog-id=107 op=LOAD Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.052000 audit: BPF prog-id=108 op=LOAD Feb 9 10:27:08.052000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:27:08.052000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit: BPF prog-id=109 op=LOAD Feb 9 10:27:08.053000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit: BPF prog-id=110 op=LOAD Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.053000 audit: BPF prog-id=111 op=LOAD Feb 9 10:27:08.053000 audit: BPF prog-id=65 op=UNLOAD Feb 9 10:27:08.053000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:27:08.077305 systemd[1]: Stopping kubelet.service... Feb 9 10:27:08.097616 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 10:27:08.097801 systemd[1]: Stopped kubelet.service. Feb 9 10:27:08.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:08.099727 systemd[1]: Started kubelet.service. Feb 9 10:27:08.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:08.159959 kubelet[2038]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:27:08.159959 kubelet[2038]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:27:08.160868 kubelet[2038]: I0209 10:27:08.159932 2038 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:27:08.164008 kubelet[2038]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:27:08.164008 kubelet[2038]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:27:08.166977 kubelet[2038]: I0209 10:27:08.166951 2038 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:27:08.167091 kubelet[2038]: I0209 10:27:08.167077 2038 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:27:08.167343 kubelet[2038]: I0209 10:27:08.167321 2038 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:27:08.168580 kubelet[2038]: I0209 10:27:08.168555 2038 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 10:27:08.169333 kubelet[2038]: I0209 10:27:08.169297 2038 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:27:08.171033 kubelet[2038]: W0209 10:27:08.171012 2038 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:27:08.172080 kubelet[2038]: I0209 10:27:08.172056 2038 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:27:08.172382 kubelet[2038]: I0209 10:27:08.172366 2038 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:27:08.172515 kubelet[2038]: I0209 10:27:08.172501 2038 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:27:08.172625 kubelet[2038]: I0209 10:27:08.172614 2038 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:27:08.172703 kubelet[2038]: I0209 10:27:08.172693 2038 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:27:08.172775 kubelet[2038]: I0209 10:27:08.172765 2038 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:27:08.177802 kubelet[2038]: I0209 10:27:08.177784 2038 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:27:08.177802 kubelet[2038]: I0209 10:27:08.177806 2038 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:27:08.177904 kubelet[2038]: I0209 10:27:08.177829 2038 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:27:08.177904 kubelet[2038]: I0209 10:27:08.177839 2038 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:27:08.179000 audit[2038]: AVC avc: denied { mac_admin } for pid=2038 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.179000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:08.179000 audit[2038]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cf3ce0 a1=40000590b0 a2=4000cf3cb0 a3=25 items=0 ppid=1 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:08.179000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:08.179000 audit[2038]: AVC avc: denied { mac_admin } for pid=2038 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.179000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:08.179000 audit[2038]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000733400 a1=40000590c8 a2=4000cf3d70 a3=25 items=0 ppid=1 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:08.179000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.179137 2038 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.179546 2038 server.go:1186] "Started kubelet" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.180917 2038 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.180956 2038 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.180975 2038 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:27:08.193667 kubelet[2038]: E0209 10:27:08.181549 2038 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:27:08.193667 kubelet[2038]: E0209 10:27:08.181571 2038 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.183535 2038 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.184008 2038 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.185054 2038 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:27:08.193667 kubelet[2038]: I0209 10:27:08.186208 2038 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:27:08.214996 kubelet[2038]: I0209 10:27:08.214978 2038 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:27:08.234765 kubelet[2038]: I0209 10:27:08.234745 2038 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:27:08.234863 kubelet[2038]: I0209 10:27:08.234853 2038 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:27:08.234924 kubelet[2038]: I0209 10:27:08.234914 2038 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:27:08.235023 kubelet[2038]: E0209 10:27:08.235012 2038 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:27:08.247672 kubelet[2038]: I0209 10:27:08.247649 2038 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:27:08.247672 kubelet[2038]: I0209 10:27:08.247669 2038 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:27:08.247788 kubelet[2038]: I0209 10:27:08.247687 2038 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:27:08.247834 kubelet[2038]: I0209 10:27:08.247819 2038 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 10:27:08.247863 kubelet[2038]: I0209 10:27:08.247838 2038 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 10:27:08.247863 kubelet[2038]: I0209 10:27:08.247848 2038 policy_none.go:49] "None policy: Start" Feb 9 10:27:08.248361 kubelet[2038]: I0209 10:27:08.248333 2038 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:27:08.248429 kubelet[2038]: I0209 10:27:08.248366 2038 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:27:08.248523 kubelet[2038]: I0209 10:27:08.248493 2038 state_mem.go:75] "Updated machine memory state" Feb 9 10:27:08.255904 kubelet[2038]: I0209 10:27:08.255862 2038 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:27:08.255973 kubelet[2038]: I0209 10:27:08.255920 2038 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:27:08.254000 audit[2038]: AVC avc: denied { mac_admin } for pid=2038 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:08.254000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:27:08.254000 audit[2038]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000149f50 a1=4000a73050 a2=4000149f20 a3=25 items=0 ppid=1 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:08.254000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:27:08.256165 kubelet[2038]: I0209 10:27:08.256078 2038 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:27:08.288454 kubelet[2038]: I0209 10:27:08.287923 2038 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 10:27:08.294098 kubelet[2038]: I0209 10:27:08.294075 2038 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 9 10:27:08.294240 kubelet[2038]: I0209 10:27:08.294228 2038 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 10:27:08.335384 kubelet[2038]: I0209 10:27:08.335346 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:08.335566 kubelet[2038]: I0209 10:27:08.335552 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:08.337307 kubelet[2038]: I0209 10:27:08.336851 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:08.387501 kubelet[2038]: I0209 10:27:08.387473 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:08.387584 kubelet[2038]: I0209 10:27:08.387513 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:08.387584 kubelet[2038]: I0209 10:27:08.387548 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:08.387584 kubelet[2038]: I0209 10:27:08.387570 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:08.387677 kubelet[2038]: I0209 10:27:08.387590 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72ae17a74a2eae76daac6d298477aff0-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"72ae17a74a2eae76daac6d298477aff0\") " pod="kube-system/kube-scheduler-localhost" Feb 9 10:27:08.387677 kubelet[2038]: I0209 10:27:08.387619 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:08.387677 kubelet[2038]: I0209 10:27:08.387640 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:08.387677 kubelet[2038]: I0209 10:27:08.387659 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:08.387768 kubelet[2038]: I0209 10:27:08.387686 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:08.584253 kubelet[2038]: E0209 10:27:08.584212 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:08.640420 kubelet[2038]: E0209 10:27:08.640387 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:08.682114 kubelet[2038]: E0209 10:27:08.682080 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:09.181371 kubelet[2038]: I0209 10:27:09.179188 2038 apiserver.go:52] "Watching apiserver" Feb 9 10:27:09.186400 kubelet[2038]: I0209 10:27:09.186364 2038 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:27:09.194642 kubelet[2038]: I0209 10:27:09.194603 2038 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:27:09.382669 kubelet[2038]: E0209 10:27:09.382629 2038 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 9 10:27:09.383116 kubelet[2038]: E0209 10:27:09.383084 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:09.605971 kubelet[2038]: E0209 10:27:09.605266 2038 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Feb 9 10:27:09.605971 kubelet[2038]: E0209 10:27:09.605603 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:09.982498 kubelet[2038]: E0209 10:27:09.982400 2038 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 9 10:27:09.982854 kubelet[2038]: E0209 10:27:09.982824 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:10.190857 kubelet[2038]: I0209 10:27:10.190817 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.190780692 pod.CreationTimestamp="2024-02-09 10:27:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:10.190499871 +0000 UTC m=+2.085754694" watchObservedRunningTime="2024-02-09 10:27:10.190780692 +0000 UTC m=+2.086035515" Feb 9 10:27:10.242645 kubelet[2038]: E0209 10:27:10.242555 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:10.242645 kubelet[2038]: E0209 10:27:10.242567 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:10.242799 kubelet[2038]: E0209 10:27:10.242651 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:10.583713 kubelet[2038]: I0209 10:27:10.583674 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.583639922 pod.CreationTimestamp="2024-02-09 10:27:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:10.583270242 +0000 UTC m=+2.478525065" watchObservedRunningTime="2024-02-09 10:27:10.583639922 +0000 UTC m=+2.478894745" Feb 9 10:27:10.982966 kubelet[2038]: I0209 10:27:10.982883 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.982857847 pod.CreationTimestamp="2024-02-09 10:27:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:10.982658404 +0000 UTC m=+2.877913187" watchObservedRunningTime="2024-02-09 10:27:10.982857847 +0000 UTC m=+2.878112670" Feb 9 10:27:11.243430 kubelet[2038]: E0209 10:27:11.243372 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:11.243735 kubelet[2038]: E0209 10:27:11.243561 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:12.618767 sudo[1273]: pam_unix(sudo:session): session closed for user root Feb 9 10:27:12.617000 audit[1273]: USER_END pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:12.621608 sshd[1270]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:12.621821 kernel: kauditd_printk_skb: 254 callbacks suppressed Feb 9 10:27:12.621846 kernel: audit: type=1106 audit(1707474432.617:961): pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:12.621870 kernel: audit: type=1104 audit(1707474432.618:962): pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:12.618000 audit[1273]: CRED_DISP pid=1273 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:27:12.623000 audit[1270]: USER_END pid=1270 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:12.625796 systemd[1]: sshd@6-10.0.0.3:22-10.0.0.1:39766.service: Deactivated successfully. Feb 9 10:27:12.626562 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:27:12.626732 systemd[1]: session-7.scope: Consumed 6.666s CPU time. Feb 9 10:27:12.623000 audit[1270]: CRED_DISP pid=1270 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:12.629608 kernel: audit: type=1106 audit(1707474432.623:963): pid=1270 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:12.629645 kernel: audit: type=1104 audit(1707474432.623:964): pid=1270 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:12.629707 systemd-logind[1124]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:27:12.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:39766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:12.631734 kernel: audit: type=1131 audit(1707474432.624:965): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:39766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:12.632116 systemd-logind[1124]: Removed session 7. Feb 9 10:27:13.118007 kubelet[2038]: E0209 10:27:13.117984 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:13.245908 kubelet[2038]: E0209 10:27:13.245885 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:20.034926 kubelet[2038]: E0209 10:27:20.034619 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:20.246000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.252720 kernel: audit: type=1400 audit(1707474440.246:966): avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.252789 kernel: audit: type=1300 audit(1707474440.246:966): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001526080 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.246000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001526080 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:20.255422 kernel: audit: type=1327 audit(1707474440.246:966): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:20.249000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.258346 kernel: audit: type=1400 audit(1707474440.249:967): avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.259312 kubelet[2038]: E0209 10:27:20.259294 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:20.249000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009a5d20 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.262868 kernel: audit: type=1300 audit(1707474440.249:967): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009a5d20 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.262973 kernel: audit: type=1327 audit(1707474440.249:967): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:20.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:20.251000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.267528 kernel: audit: type=1400 audit(1707474440.251:968): avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.267560 kernel: audit: type=1300 audit(1707474440.251:968): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009a5e40 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.251000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009a5e40 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.251000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:20.273001 kernel: audit: type=1327 audit(1707474440.251:968): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:20.273062 kernel: audit: type=1400 audit(1707474440.251:969): avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.251000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:20.251000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400143e920 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:20.251000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:21.023855 kubelet[2038]: E0209 10:27:21.023832 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:21.029891 update_engine[1125]: I0209 10:27:21.029397 1125 update_attempter.cc:509] Updating boot flags... Feb 9 10:27:22.271000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=6520 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:27:22.271000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d6d340 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:27:22.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:22.556680 kubelet[2038]: I0209 10:27:22.556646 2038 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 10:27:22.557310 env[1140]: time="2024-02-09T10:27:22.557264874Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 10:27:22.557917 kubelet[2038]: I0209 10:27:22.557901 2038 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 10:27:23.238714 kubelet[2038]: I0209 10:27:23.238674 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:23.243362 systemd[1]: Created slice kubepods-besteffort-pod6fd57b2e_9e68_468b_962b_8dfde884f571.slice. Feb 9 10:27:23.277489 kubelet[2038]: I0209 10:27:23.277461 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6fd57b2e-9e68-468b-962b-8dfde884f571-kube-proxy\") pod \"kube-proxy-v7m9b\" (UID: \"6fd57b2e-9e68-468b-962b-8dfde884f571\") " pod="kube-system/kube-proxy-v7m9b" Feb 9 10:27:23.277623 kubelet[2038]: I0209 10:27:23.277529 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6fd57b2e-9e68-468b-962b-8dfde884f571-xtables-lock\") pod \"kube-proxy-v7m9b\" (UID: \"6fd57b2e-9e68-468b-962b-8dfde884f571\") " pod="kube-system/kube-proxy-v7m9b" Feb 9 10:27:23.277623 kubelet[2038]: I0209 10:27:23.277598 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6fd57b2e-9e68-468b-962b-8dfde884f571-lib-modules\") pod \"kube-proxy-v7m9b\" (UID: \"6fd57b2e-9e68-468b-962b-8dfde884f571\") " pod="kube-system/kube-proxy-v7m9b" Feb 9 10:27:23.277678 kubelet[2038]: I0209 10:27:23.277634 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bnnhl\" (UniqueName: \"kubernetes.io/projected/6fd57b2e-9e68-468b-962b-8dfde884f571-kube-api-access-bnnhl\") pod \"kube-proxy-v7m9b\" (UID: \"6fd57b2e-9e68-468b-962b-8dfde884f571\") " pod="kube-system/kube-proxy-v7m9b" Feb 9 10:27:23.550383 kubelet[2038]: I0209 10:27:23.550332 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:23.551304 kubelet[2038]: E0209 10:27:23.551284 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:23.551921 env[1140]: time="2024-02-09T10:27:23.551883033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v7m9b,Uid:6fd57b2e-9e68-468b-962b-8dfde884f571,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:23.555696 systemd[1]: Created slice kubepods-besteffort-podd031639b_9113_4c43_8173_65e9274ca846.slice. Feb 9 10:27:23.569329 env[1140]: time="2024-02-09T10:27:23.569265683Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:23.569329 env[1140]: time="2024-02-09T10:27:23.569303847Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:23.569329 env[1140]: time="2024-02-09T10:27:23.569314969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:23.569664 env[1140]: time="2024-02-09T10:27:23.569445343Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce4ab2b89b0103f7f0af36249f5f824bce9bf3aef21d922b008c023f92739e65 pid=2166 runtime=io.containerd.runc.v2 Feb 9 10:27:23.579229 kubelet[2038]: I0209 10:27:23.579204 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d031639b-9113-4c43-8173-65e9274ca846-var-lib-calico\") pod \"tigera-operator-cfc98749c-kj5f9\" (UID: \"d031639b-9113-4c43-8173-65e9274ca846\") " pod="tigera-operator/tigera-operator-cfc98749c-kj5f9" Feb 9 10:27:23.579543 kubelet[2038]: I0209 10:27:23.579526 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-68bw6\" (UniqueName: \"kubernetes.io/projected/d031639b-9113-4c43-8173-65e9274ca846-kube-api-access-68bw6\") pod \"tigera-operator-cfc98749c-kj5f9\" (UID: \"d031639b-9113-4c43-8173-65e9274ca846\") " pod="tigera-operator/tigera-operator-cfc98749c-kj5f9" Feb 9 10:27:23.582844 systemd[1]: Started cri-containerd-ce4ab2b89b0103f7f0af36249f5f824bce9bf3aef21d922b008c023f92739e65.scope. Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit: BPF prog-id=112 op=LOAD Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2166 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365346162326238396230313033663766306166333632343966356638 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2166 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365346162326238396230313033663766306166333632343966356638 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit: BPF prog-id=113 op=LOAD Feb 9 10:27:23.600000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2166 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365346162326238396230313033663766306166333632343966356638 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit: BPF prog-id=114 op=LOAD Feb 9 10:27:23.600000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2166 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365346162326238396230313033663766306166333632343966356638 Feb 9 10:27:23.600000 audit: BPF prog-id=114 op=UNLOAD Feb 9 10:27:23.600000 audit: BPF prog-id=113 op=UNLOAD Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.600000 audit: BPF prog-id=115 op=LOAD Feb 9 10:27:23.600000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2166 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365346162326238396230313033663766306166333632343966356638 Feb 9 10:27:23.611407 env[1140]: time="2024-02-09T10:27:23.611370782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v7m9b,Uid:6fd57b2e-9e68-468b-962b-8dfde884f571,Namespace:kube-system,Attempt:0,} returns sandbox id \"ce4ab2b89b0103f7f0af36249f5f824bce9bf3aef21d922b008c023f92739e65\"" Feb 9 10:27:23.617908 kubelet[2038]: E0209 10:27:23.617879 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:23.622025 env[1140]: time="2024-02-09T10:27:23.621984296Z" level=info msg="CreateContainer within sandbox \"ce4ab2b89b0103f7f0af36249f5f824bce9bf3aef21d922b008c023f92739e65\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 10:27:23.635033 env[1140]: time="2024-02-09T10:27:23.634992791Z" level=info msg="CreateContainer within sandbox \"ce4ab2b89b0103f7f0af36249f5f824bce9bf3aef21d922b008c023f92739e65\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"df792aadd7a02cd5887e76685dd9632a29c0672d782384a9bddb4ebd8900ea87\"" Feb 9 10:27:23.635704 env[1140]: time="2024-02-09T10:27:23.635599137Z" level=info msg="StartContainer for \"df792aadd7a02cd5887e76685dd9632a29c0672d782384a9bddb4ebd8900ea87\"" Feb 9 10:27:23.649603 systemd[1]: Started cri-containerd-df792aadd7a02cd5887e76685dd9632a29c0672d782384a9bddb4ebd8900ea87.scope. Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373932616164643761303263643538383765373636383564643936 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit: BPF prog-id=116 op=LOAD Feb 9 10:27:23.676000 audit[2207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373932616164643761303263643538383765373636383564643936 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit: BPF prog-id=117 op=LOAD Feb 9 10:27:23.676000 audit[2207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373932616164643761303263643538383765373636383564643936 Feb 9 10:27:23.676000 audit: BPF prog-id=117 op=UNLOAD Feb 9 10:27:23.676000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.676000 audit: BPF prog-id=118 op=LOAD Feb 9 10:27:23.676000 audit[2207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466373932616164643761303263643538383765373636383564643936 Feb 9 10:27:23.694641 env[1140]: time="2024-02-09T10:27:23.694591872Z" level=info msg="StartContainer for \"df792aadd7a02cd5887e76685dd9632a29c0672d782384a9bddb4ebd8900ea87\" returns successfully" Feb 9 10:27:23.785000 audit[2257]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.785000 audit[2258]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.785000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd965200 a2=0 a3=ffffb77036c0 items=0 ppid=2217 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:27:23.785000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5d69050 a2=0 a3=ffffa0b1b6c0 items=0 ppid=2217 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:27:23.787000 audit[2259]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.787000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4b35570 a2=0 a3=ffffbf60b6c0 items=0 ppid=2217 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:27:23.788000 audit[2260]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.788000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5a16220 a2=0 a3=ffffa7d486c0 items=0 ppid=2217 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:27:23.792000 audit[2261]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.792000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce8220f0 a2=0 a3=ffffb11056c0 items=0 ppid=2217 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:27:23.794000 audit[2262]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.794000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff284f700 a2=0 a3=ffffadf0e6c0 items=0 ppid=2217 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:27:23.859156 env[1140]: time="2024-02-09T10:27:23.859067878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-kj5f9,Uid:d031639b-9113-4c43-8173-65e9274ca846,Namespace:tigera-operator,Attempt:0,}" Feb 9 10:27:23.872043 env[1140]: time="2024-02-09T10:27:23.871971601Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:23.872123 env[1140]: time="2024-02-09T10:27:23.872050570Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:23.872123 env[1140]: time="2024-02-09T10:27:23.872077773Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:23.872335 env[1140]: time="2024-02-09T10:27:23.872293396Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4eb3852e15f973ada39f76775303b77f4e35e0260aaf0c35328c69aa235adb80 pid=2271 runtime=io.containerd.runc.v2 Feb 9 10:27:23.882569 systemd[1]: Started cri-containerd-4eb3852e15f973ada39f76775303b77f4e35e0260aaf0c35328c69aa235adb80.scope. Feb 9 10:27:23.887000 audit[2294]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.887000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc53339c0 a2=0 a3=ffffb40076c0 items=0 ppid=2217 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:27:23.892000 audit[2301]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.892000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd80697c0 a2=0 a3=ffff8f10a6c0 items=0 ppid=2217 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 10:27:23.896000 audit[2304]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.896000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffedd2c700 a2=0 a3=ffffa93956c0 items=0 ppid=2217 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 10:27:23.897000 audit[2305]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.897000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff009be50 a2=0 a3=ffff9962f6c0 items=0 ppid=2217 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:27:23.899000 audit[2307]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.899000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5d7df40 a2=0 a3=ffff9ae486c0 items=0 ppid=2217 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit: BPF prog-id=119 op=LOAD Feb 9 10:27:23.900000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623338353265313566393733616461333966373637373533303362 Feb 9 10:27:23.900000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.900000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623338353265313566393733616461333966373637373533303362 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit: BPF prog-id=120 op=LOAD Feb 9 10:27:23.901000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623338353265313566393733616461333966373637373533303362 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit: BPF prog-id=121 op=LOAD Feb 9 10:27:23.901000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623338353265313566393733616461333966373637373533303362 Feb 9 10:27:23.901000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:27:23.901000 audit: BPF prog-id=120 op=UNLOAD Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit[2308]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.901000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc39c9680 a2=0 a3=ffff854f26c0 items=0 ppid=2217 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:27:23.901000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.901000 audit: BPF prog-id=122 op=LOAD Feb 9 10:27:23.901000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465623338353265313566393733616461333966373637373533303362 Feb 9 10:27:23.903000 audit[2310]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.903000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd8b63740 a2=0 a3=ffffa4bb46c0 items=0 ppid=2217 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:27:23.906000 audit[2313]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.906000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc6ec2570 a2=0 a3=ffffbb0006c0 items=0 ppid=2217 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 10:27:23.907000 audit[2314]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.907000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1705c10 a2=0 a3=ffffbdd9d6c0 items=0 ppid=2217 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:27:23.910000 audit[2316]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.910000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea002380 a2=0 a3=ffffafb516c0 items=0 ppid=2217 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:27:23.911000 audit[2318]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.911000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2b5ab00 a2=0 a3=ffffbbf376c0 items=0 ppid=2217 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:27:23.913000 audit[2325]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.913000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0624240 a2=0 a3=ffffadac56c0 items=0 ppid=2217 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:27:23.917000 audit[2328]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.917000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdec70650 a2=0 a3=ffffad7666c0 items=0 ppid=2217 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:27:23.919290 env[1140]: time="2024-02-09T10:27:23.919234301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-kj5f9,Uid:d031639b-9113-4c43-8173-65e9274ca846,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4eb3852e15f973ada39f76775303b77f4e35e0260aaf0c35328c69aa235adb80\"" Feb 9 10:27:23.921027 env[1140]: time="2024-02-09T10:27:23.920997212Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 10:27:23.920000 audit[2331]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.920000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb2e15c0 a2=0 a3=ffff991236c0 items=0 ppid=2217 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:27:23.922000 audit[2332]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.922000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffabd4850 a2=0 a3=ffff941846c0 items=0 ppid=2217 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:27:23.925000 audit[2334]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.925000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff3ed8650 a2=0 a3=ffff913946c0 items=0 ppid=2217 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.925000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:23.928000 audit[2337]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:27:23.928000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd763d2a0 a2=0 a3=ffff8c39c6c0 items=0 ppid=2217 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:23.937000 audit[2341]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:23.937000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffe23204e0 a2=0 a3=ffffb8ec36c0 items=0 ppid=2217 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:23.941000 audit[2341]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:23.941000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe23204e0 a2=0 a3=ffffb8ec36c0 items=0 ppid=2217 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.941000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:23.942000 audit[2344]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.942000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffeb9f0820 a2=0 a3=ffff9e36e6c0 items=0 ppid=2217 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:27:23.944000 audit[2346]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.944000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5b27540 a2=0 a3=ffff816746c0 items=0 ppid=2217 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 10:27:23.952000 audit[2349]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.952000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe5e8f6f0 a2=0 a3=ffffb3a236c0 items=0 ppid=2217 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 10:27:23.953000 audit[2350]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.953000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff661ee70 a2=0 a3=ffff82efb6c0 items=0 ppid=2217 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:27:23.955000 audit[2352]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.955000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa2352f0 a2=0 a3=ffff8593c6c0 items=0 ppid=2217 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:27:23.956000 audit[2353]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.956000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc09fc6b0 a2=0 a3=ffffb71366c0 items=0 ppid=2217 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:27:23.958000 audit[2355]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.958000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe8c19070 a2=0 a3=ffffbc4546c0 items=0 ppid=2217 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 10:27:23.961000 audit[2358]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.961000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc0741410 a2=0 a3=ffffbb51e6c0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:27:23.962000 audit[2359]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.962000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd37ac4b0 a2=0 a3=ffffb4f096c0 items=0 ppid=2217 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:27:23.964000 audit[2361]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.964000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdedae1e0 a2=0 a3=ffffa3dea6c0 items=0 ppid=2217 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:27:23.965000 audit[2362]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.965000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce3a6e00 a2=0 a3=ffff90ffd6c0 items=0 ppid=2217 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:27:23.967000 audit[2364]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.967000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffea49d130 a2=0 a3=ffffa7c266c0 items=0 ppid=2217 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:27:23.971000 audit[2367]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.971000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6931d50 a2=0 a3=ffff865ef6c0 items=0 ppid=2217 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:27:23.974000 audit[2370]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.974000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff998f940 a2=0 a3=ffffa8ff96c0 items=0 ppid=2217 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 10:27:23.975000 audit[2371]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.975000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff2d2c880 a2=0 a3=ffffa7e446c0 items=0 ppid=2217 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:27:23.977000 audit[2373]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.977000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc5956450 a2=0 a3=ffffa1ab46c0 items=0 ppid=2217 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:23.979000 audit[2376]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:27:23.979000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe795df00 a2=0 a3=ffff873256c0 items=0 ppid=2217 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:27:23.984000 audit[2380]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:27:23.984000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffce261c50 a2=0 a3=ffff955f26c0 items=0 ppid=2217 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.984000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:23.985000 audit[2380]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:27:23.985000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffce261c50 a2=0 a3=ffff955f26c0 items=0 ppid=2217 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:23.985000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:24.266297 kubelet[2038]: E0209 10:27:24.266184 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:24.273817 kubelet[2038]: I0209 10:27:24.273685 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-v7m9b" podStartSLOduration=1.273653965 pod.CreationTimestamp="2024-02-09 10:27:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:24.273110269 +0000 UTC m=+16.168365092" watchObservedRunningTime="2024-02-09 10:27:24.273653965 +0000 UTC m=+16.168908788" Feb 9 10:27:24.683176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4224696194.mount: Deactivated successfully. Feb 9 10:27:25.178907 env[1140]: time="2024-02-09T10:27:25.178866038Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:25.180198 env[1140]: time="2024-02-09T10:27:25.180169287Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:25.181701 env[1140]: time="2024-02-09T10:27:25.181667555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:25.183024 env[1140]: time="2024-02-09T10:27:25.182997527Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:25.183736 env[1140]: time="2024-02-09T10:27:25.183709797Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 10:27:25.187047 env[1140]: time="2024-02-09T10:27:25.187013484Z" level=info msg="CreateContainer within sandbox \"4eb3852e15f973ada39f76775303b77f4e35e0260aaf0c35328c69aa235adb80\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 10:27:25.197077 env[1140]: time="2024-02-09T10:27:25.197045075Z" level=info msg="CreateContainer within sandbox \"4eb3852e15f973ada39f76775303b77f4e35e0260aaf0c35328c69aa235adb80\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"847b6d6d962606935b909c32f1366f07342a01c0fadbe8813e49dabc99c5a6b9\"" Feb 9 10:27:25.198766 env[1140]: time="2024-02-09T10:27:25.197585409Z" level=info msg="StartContainer for \"847b6d6d962606935b909c32f1366f07342a01c0fadbe8813e49dabc99c5a6b9\"" Feb 9 10:27:25.211682 systemd[1]: Started cri-containerd-847b6d6d962606935b909c32f1366f07342a01c0fadbe8813e49dabc99c5a6b9.scope. Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.233000 audit: BPF prog-id=123 op=LOAD Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2271 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376236643664393632363036393335623930396333326631333636 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2271 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376236643664393632363036393335623930396333326631333636 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit: BPF prog-id=124 op=LOAD Feb 9 10:27:25.234000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2271 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376236643664393632363036393335623930396333326631333636 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit: BPF prog-id=125 op=LOAD Feb 9 10:27:25.234000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2271 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376236643664393632363036393335623930396333326631333636 Feb 9 10:27:25.234000 audit: BPF prog-id=125 op=UNLOAD Feb 9 10:27:25.234000 audit: BPF prog-id=124 op=UNLOAD Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:25.234000 audit: BPF prog-id=126 op=LOAD Feb 9 10:27:25.234000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2271 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:25.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376236643664393632363036393335623930396333326631333636 Feb 9 10:27:25.264940 env[1140]: time="2024-02-09T10:27:25.264893741Z" level=info msg="StartContainer for \"847b6d6d962606935b909c32f1366f07342a01c0fadbe8813e49dabc99c5a6b9\" returns successfully" Feb 9 10:27:25.269723 kubelet[2038]: E0209 10:27:25.268756 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:25.390201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2825505271.mount: Deactivated successfully. Feb 9 10:27:27.968000 audit[2445]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.971472 kernel: kauditd_printk_skb: 351 callbacks suppressed Feb 9 10:27:27.971511 kernel: audit: type=1325 audit(1707474447.968:1075): table=filter:103 family=2 entries=13 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.971529 kernel: audit: type=1300 audit(1707474447.968:1075): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffec9c7e10 a2=0 a3=ffff922586c0 items=0 ppid=2217 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.968000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffec9c7e10 a2=0 a3=ffff922586c0 items=0 ppid=2217 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.975735 kernel: audit: type=1327 audit(1707474447.968:1075): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.968000 audit[2445]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.968000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffec9c7e10 a2=0 a3=ffff922586c0 items=0 ppid=2217 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.981179 kernel: audit: type=1325 audit(1707474447.968:1076): table=nat:104 family=2 entries=20 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.981241 kernel: audit: type=1300 audit(1707474447.968:1076): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffec9c7e10 a2=0 a3=ffff922586c0 items=0 ppid=2217 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.983378 kernel: audit: type=1327 audit(1707474447.968:1076): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:28.006000 audit[2471]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:28.006000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffe7e9ff60 a2=0 a3=ffffbebfc6c0 items=0 ppid=2217 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.012089 kernel: audit: type=1325 audit(1707474448.006:1077): table=filter:105 family=2 entries=14 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:28.012161 kernel: audit: type=1300 audit(1707474448.006:1077): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffe7e9ff60 a2=0 a3=ffffbebfc6c0 items=0 ppid=2217 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.012181 kernel: audit: type=1327 audit(1707474448.006:1077): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:28.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:28.006000 audit[2471]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:28.006000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe7e9ff60 a2=0 a3=ffffbebfc6c0 items=0 ppid=2217 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:28.019375 kernel: audit: type=1325 audit(1707474448.006:1078): table=nat:106 family=2 entries=20 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:28.070430 kubelet[2038]: I0209 10:27:28.069832 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-kj5f9" podStartSLOduration=-9.22337203178498e+09 pod.CreationTimestamp="2024-02-09 10:27:23 +0000 UTC" firstStartedPulling="2024-02-09 10:27:23.920297976 +0000 UTC m=+15.815552799" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:25.278529129 +0000 UTC m=+17.173783912" watchObservedRunningTime="2024-02-09 10:27:28.069795319 +0000 UTC m=+19.965050142" Feb 9 10:27:28.070430 kubelet[2038]: I0209 10:27:28.070031 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:28.074777 systemd[1]: Created slice kubepods-besteffort-pod5d39698e_a33a_46df_b9a0_a9653ac722a3.slice. Feb 9 10:27:28.111573 kubelet[2038]: I0209 10:27:28.111541 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5d39698e-a33a-46df-b9a0-a9653ac722a3-tigera-ca-bundle\") pod \"calico-typha-6c679b5b88-cqrsd\" (UID: \"5d39698e-a33a-46df-b9a0-a9653ac722a3\") " pod="calico-system/calico-typha-6c679b5b88-cqrsd" Feb 9 10:27:28.111788 kubelet[2038]: I0209 10:27:28.111770 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5d39698e-a33a-46df-b9a0-a9653ac722a3-typha-certs\") pod \"calico-typha-6c679b5b88-cqrsd\" (UID: \"5d39698e-a33a-46df-b9a0-a9653ac722a3\") " pod="calico-system/calico-typha-6c679b5b88-cqrsd" Feb 9 10:27:28.111879 kubelet[2038]: I0209 10:27:28.111870 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jfqdn\" (UniqueName: \"kubernetes.io/projected/5d39698e-a33a-46df-b9a0-a9653ac722a3-kube-api-access-jfqdn\") pod \"calico-typha-6c679b5b88-cqrsd\" (UID: \"5d39698e-a33a-46df-b9a0-a9653ac722a3\") " pod="calico-system/calico-typha-6c679b5b88-cqrsd" Feb 9 10:27:28.131064 kubelet[2038]: I0209 10:27:28.131023 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:28.136155 systemd[1]: Created slice kubepods-besteffort-pod9d6d25cb_bc28_4bf5_8cee_06b949f88b66.slice. Feb 9 10:27:28.212500 kubelet[2038]: I0209 10:27:28.212465 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-lib-modules\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.212710 kubelet[2038]: I0209 10:27:28.212697 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-var-run-calico\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.212847 kubelet[2038]: I0209 10:27:28.212801 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-var-lib-calico\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.212847 kubelet[2038]: I0209 10:27:28.212846 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-flexvol-driver-host\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.212934 kubelet[2038]: I0209 10:27:28.212872 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-policysync\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.212934 kubelet[2038]: I0209 10:27:28.212894 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-cni-log-dir\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.213300 kubelet[2038]: I0209 10:27:28.213272 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-tigera-ca-bundle\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.213384 kubelet[2038]: I0209 10:27:28.213307 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-node-certs\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.213384 kubelet[2038]: I0209 10:27:28.213331 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-cni-net-dir\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.213453 kubelet[2038]: I0209 10:27:28.213400 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrc9b\" (UniqueName: \"kubernetes.io/projected/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-kube-api-access-zrc9b\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.213478 kubelet[2038]: I0209 10:27:28.213458 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-xtables-lock\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.213501 kubelet[2038]: I0209 10:27:28.213494 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9d6d25cb-bc28-4bf5-8cee-06b949f88b66-cni-bin-dir\") pod \"calico-node-9tfdj\" (UID: \"9d6d25cb-bc28-4bf5-8cee-06b949f88b66\") " pod="calico-system/calico-node-9tfdj" Feb 9 10:27:28.249676 kubelet[2038]: I0209 10:27:28.249579 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:28.249859 kubelet[2038]: E0209 10:27:28.249840 2038 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:28.314694 kubelet[2038]: I0209 10:27:28.314661 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e7733a2d-55f9-40e4-9366-0a67823fa03e-registration-dir\") pod \"csi-node-driver-kmz4b\" (UID: \"e7733a2d-55f9-40e4-9366-0a67823fa03e\") " pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:28.314821 kubelet[2038]: I0209 10:27:28.314717 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e7733a2d-55f9-40e4-9366-0a67823fa03e-varrun\") pod \"csi-node-driver-kmz4b\" (UID: \"e7733a2d-55f9-40e4-9366-0a67823fa03e\") " pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:28.314821 kubelet[2038]: I0209 10:27:28.314741 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qg69t\" (UniqueName: \"kubernetes.io/projected/e7733a2d-55f9-40e4-9366-0a67823fa03e-kube-api-access-qg69t\") pod \"csi-node-driver-kmz4b\" (UID: \"e7733a2d-55f9-40e4-9366-0a67823fa03e\") " pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:28.315234 kubelet[2038]: E0209 10:27:28.315208 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.315277 kubelet[2038]: W0209 10:27:28.315234 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.315277 kubelet[2038]: E0209 10:27:28.315262 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.315464 kubelet[2038]: E0209 10:27:28.315449 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.315464 kubelet[2038]: W0209 10:27:28.315462 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.315522 kubelet[2038]: E0209 10:27:28.315473 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.315643 kubelet[2038]: E0209 10:27:28.315630 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.315643 kubelet[2038]: W0209 10:27:28.315642 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.315708 kubelet[2038]: E0209 10:27:28.315652 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.315839 kubelet[2038]: E0209 10:27:28.315827 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.315839 kubelet[2038]: W0209 10:27:28.315836 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.315898 kubelet[2038]: E0209 10:27:28.315846 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.316319 kubelet[2038]: E0209 10:27:28.316303 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.316319 kubelet[2038]: W0209 10:27:28.316318 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.316409 kubelet[2038]: E0209 10:27:28.316337 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.316646 kubelet[2038]: E0209 10:27:28.316627 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.316646 kubelet[2038]: W0209 10:27:28.316644 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.316705 kubelet[2038]: E0209 10:27:28.316662 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.316839 kubelet[2038]: E0209 10:27:28.316820 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.316839 kubelet[2038]: W0209 10:27:28.316834 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.316918 kubelet[2038]: E0209 10:27:28.316845 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.317023 kubelet[2038]: E0209 10:27:28.317002 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.317023 kubelet[2038]: W0209 10:27:28.317015 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.317023 kubelet[2038]: E0209 10:27:28.317029 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.317193 kubelet[2038]: E0209 10:27:28.317163 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.317193 kubelet[2038]: W0209 10:27:28.317175 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.317193 kubelet[2038]: E0209 10:27:28.317186 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.317388 kubelet[2038]: E0209 10:27:28.317361 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.317388 kubelet[2038]: W0209 10:27:28.317373 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.317388 kubelet[2038]: E0209 10:27:28.317384 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.317554 kubelet[2038]: E0209 10:27:28.317538 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.317554 kubelet[2038]: W0209 10:27:28.317551 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.317632 kubelet[2038]: E0209 10:27:28.317561 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.317632 kubelet[2038]: I0209 10:27:28.317580 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e7733a2d-55f9-40e4-9366-0a67823fa03e-kubelet-dir\") pod \"csi-node-driver-kmz4b\" (UID: \"e7733a2d-55f9-40e4-9366-0a67823fa03e\") " pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:28.317749 kubelet[2038]: E0209 10:27:28.317723 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.317749 kubelet[2038]: W0209 10:27:28.317735 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.317749 kubelet[2038]: E0209 10:27:28.317746 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.317838 kubelet[2038]: I0209 10:27:28.317762 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e7733a2d-55f9-40e4-9366-0a67823fa03e-socket-dir\") pod \"csi-node-driver-kmz4b\" (UID: \"e7733a2d-55f9-40e4-9366-0a67823fa03e\") " pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:28.317924 kubelet[2038]: E0209 10:27:28.317893 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.317924 kubelet[2038]: W0209 10:27:28.317908 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.317924 kubelet[2038]: E0209 10:27:28.317918 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.318072 kubelet[2038]: E0209 10:27:28.318061 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.318072 kubelet[2038]: W0209 10:27:28.318071 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.318138 kubelet[2038]: E0209 10:27:28.318081 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.318213 kubelet[2038]: E0209 10:27:28.318201 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.318213 kubelet[2038]: W0209 10:27:28.318211 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.318281 kubelet[2038]: E0209 10:27:28.318220 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.318442 kubelet[2038]: E0209 10:27:28.318428 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.318442 kubelet[2038]: W0209 10:27:28.318441 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.318506 kubelet[2038]: E0209 10:27:28.318457 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.318675 kubelet[2038]: E0209 10:27:28.318663 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.318675 kubelet[2038]: W0209 10:27:28.318675 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.318733 kubelet[2038]: E0209 10:27:28.318691 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.318836 kubelet[2038]: E0209 10:27:28.318823 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.318836 kubelet[2038]: W0209 10:27:28.318834 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.318893 kubelet[2038]: E0209 10:27:28.318850 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.319000 kubelet[2038]: E0209 10:27:28.318986 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.319000 kubelet[2038]: W0209 10:27:28.318999 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.319062 kubelet[2038]: E0209 10:27:28.319047 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.319156 kubelet[2038]: E0209 10:27:28.319144 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.319156 kubelet[2038]: W0209 10:27:28.319155 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.319210 kubelet[2038]: E0209 10:27:28.319196 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.319304 kubelet[2038]: E0209 10:27:28.319292 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.319304 kubelet[2038]: W0209 10:27:28.319302 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.319397 kubelet[2038]: E0209 10:27:28.319369 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.319576 kubelet[2038]: E0209 10:27:28.319562 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.319576 kubelet[2038]: W0209 10:27:28.319574 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.319634 kubelet[2038]: E0209 10:27:28.319590 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.319764 kubelet[2038]: E0209 10:27:28.319752 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.319764 kubelet[2038]: W0209 10:27:28.319762 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.319822 kubelet[2038]: E0209 10:27:28.319776 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.320003 kubelet[2038]: E0209 10:27:28.319990 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.320003 kubelet[2038]: W0209 10:27:28.320002 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.320068 kubelet[2038]: E0209 10:27:28.320015 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.320201 kubelet[2038]: E0209 10:27:28.320189 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.320201 kubelet[2038]: W0209 10:27:28.320200 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.320272 kubelet[2038]: E0209 10:27:28.320214 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.320388 kubelet[2038]: E0209 10:27:28.320375 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.320388 kubelet[2038]: W0209 10:27:28.320387 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.320455 kubelet[2038]: E0209 10:27:28.320403 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.320572 kubelet[2038]: E0209 10:27:28.320559 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.320572 kubelet[2038]: W0209 10:27:28.320570 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.320630 kubelet[2038]: E0209 10:27:28.320584 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.320718 kubelet[2038]: E0209 10:27:28.320708 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.320718 kubelet[2038]: W0209 10:27:28.320717 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.320768 kubelet[2038]: E0209 10:27:28.320727 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.320852 kubelet[2038]: E0209 10:27:28.320842 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.320852 kubelet[2038]: W0209 10:27:28.320851 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.320908 kubelet[2038]: E0209 10:27:28.320860 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.321418 kubelet[2038]: E0209 10:27:28.321090 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.321418 kubelet[2038]: W0209 10:27:28.321103 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.321418 kubelet[2038]: E0209 10:27:28.321114 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.321418 kubelet[2038]: E0209 10:27:28.321294 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.321418 kubelet[2038]: W0209 10:27:28.321304 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.321418 kubelet[2038]: E0209 10:27:28.321315 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.321816 kubelet[2038]: E0209 10:27:28.321737 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.321816 kubelet[2038]: W0209 10:27:28.321750 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.321816 kubelet[2038]: E0209 10:27:28.321763 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.321947 kubelet[2038]: E0209 10:27:28.321932 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.321947 kubelet[2038]: W0209 10:27:28.321944 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.321998 kubelet[2038]: E0209 10:27:28.321955 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.322131 kubelet[2038]: E0209 10:27:28.322120 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.322131 kubelet[2038]: W0209 10:27:28.322130 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.322187 kubelet[2038]: E0209 10:27:28.322141 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.325922 kubelet[2038]: E0209 10:27:28.325895 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.325922 kubelet[2038]: W0209 10:27:28.325913 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.326001 kubelet[2038]: E0209 10:27:28.325930 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.376502 kubelet[2038]: E0209 10:27:28.376465 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:28.377195 env[1140]: time="2024-02-09T10:27:28.376838781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c679b5b88-cqrsd,Uid:5d39698e-a33a-46df-b9a0-a9653ac722a3,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:28.392802 env[1140]: time="2024-02-09T10:27:28.392743111Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:28.393403 env[1140]: time="2024-02-09T10:27:28.392780314Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:28.393498 env[1140]: time="2024-02-09T10:27:28.393474894Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:28.393822 env[1140]: time="2024-02-09T10:27:28.393765279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/327a058eada4c448f4a3c3dc0b933783c4d58b246d76162abcfe18000ee06eb2 pid=2517 runtime=io.containerd.runc.v2 Feb 9 10:27:28.404838 systemd[1]: Started cri-containerd-327a058eada4c448f4a3c3dc0b933783c4d58b246d76162abcfe18000ee06eb2.scope. Feb 9 10:27:28.422483 kubelet[2038]: E0209 10:27:28.422452 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.422483 kubelet[2038]: W0209 10:27:28.422475 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.422607 kubelet[2038]: E0209 10:27:28.422497 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.422787 kubelet[2038]: E0209 10:27:28.422772 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.422787 kubelet[2038]: W0209 10:27:28.422784 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.422866 kubelet[2038]: E0209 10:27:28.422800 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.423014 kubelet[2038]: E0209 10:27:28.422997 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.423014 kubelet[2038]: W0209 10:27:28.423009 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.423099 kubelet[2038]: E0209 10:27:28.423025 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.423218 kubelet[2038]: E0209 10:27:28.423197 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.423218 kubelet[2038]: W0209 10:27:28.423209 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.423218 kubelet[2038]: E0209 10:27:28.423224 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.423399 kubelet[2038]: E0209 10:27:28.423385 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.423399 kubelet[2038]: W0209 10:27:28.423397 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.423464 kubelet[2038]: E0209 10:27:28.423411 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.423583 kubelet[2038]: E0209 10:27:28.423568 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.423583 kubelet[2038]: W0209 10:27:28.423580 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.423659 kubelet[2038]: E0209 10:27:28.423594 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.423814 kubelet[2038]: E0209 10:27:28.423797 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.423814 kubelet[2038]: W0209 10:27:28.423811 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.423882 kubelet[2038]: E0209 10:27:28.423855 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.423993 kubelet[2038]: E0209 10:27:28.423977 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.423993 kubelet[2038]: W0209 10:27:28.423987 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.424058 kubelet[2038]: E0209 10:27:28.424024 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.424154 kubelet[2038]: E0209 10:27:28.424140 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.424154 kubelet[2038]: W0209 10:27:28.424149 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.424217 kubelet[2038]: E0209 10:27:28.424184 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.424317 kubelet[2038]: E0209 10:27:28.424303 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.424317 kubelet[2038]: W0209 10:27:28.424313 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.424390 kubelet[2038]: E0209 10:27:28.424359 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.424490 kubelet[2038]: E0209 10:27:28.424475 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.424490 kubelet[2038]: W0209 10:27:28.424485 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.424490 kubelet[2038]: E0209 10:27:28.424498 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.424632 kubelet[2038]: E0209 10:27:28.424621 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.424632 kubelet[2038]: W0209 10:27:28.424630 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.424632 kubelet[2038]: E0209 10:27:28.424640 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.424772 kubelet[2038]: E0209 10:27:28.424759 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.424772 kubelet[2038]: W0209 10:27:28.424769 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.424837 kubelet[2038]: E0209 10:27:28.424785 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.424965 kubelet[2038]: E0209 10:27:28.424951 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.424965 kubelet[2038]: W0209 10:27:28.424961 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.425028 kubelet[2038]: E0209 10:27:28.424973 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.425115 kubelet[2038]: E0209 10:27:28.425101 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.425115 kubelet[2038]: W0209 10:27:28.425110 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.425186 kubelet[2038]: E0209 10:27:28.425124 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.425264 kubelet[2038]: E0209 10:27:28.425251 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.425264 kubelet[2038]: W0209 10:27:28.425260 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.425361 kubelet[2038]: E0209 10:27:28.425342 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.425515 kubelet[2038]: E0209 10:27:28.425503 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.425515 kubelet[2038]: W0209 10:27:28.425513 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.425615 kubelet[2038]: E0209 10:27:28.425597 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.425660 kubelet[2038]: E0209 10:27:28.425649 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.425660 kubelet[2038]: W0209 10:27:28.425656 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.425747 kubelet[2038]: E0209 10:27:28.425733 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.425789 kubelet[2038]: E0209 10:27:28.425776 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.425789 kubelet[2038]: W0209 10:27:28.425782 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.425872 kubelet[2038]: E0209 10:27:28.425860 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.425960 kubelet[2038]: E0209 10:27:28.425945 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.425960 kubelet[2038]: W0209 10:27:28.425953 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426025 kubelet[2038]: E0209 10:27:28.425969 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.426117 kubelet[2038]: E0209 10:27:28.426104 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.426117 kubelet[2038]: W0209 10:27:28.426113 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426183 kubelet[2038]: E0209 10:27:28.426131 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.426313 kubelet[2038]: E0209 10:27:28.426300 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.426313 kubelet[2038]: W0209 10:27:28.426310 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426391 kubelet[2038]: E0209 10:27:28.426323 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.426480 kubelet[2038]: E0209 10:27:28.426467 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.426480 kubelet[2038]: W0209 10:27:28.426476 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426550 kubelet[2038]: E0209 10:27:28.426489 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.426645 kubelet[2038]: E0209 10:27:28.426627 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.426645 kubelet[2038]: W0209 10:27:28.426637 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426645 kubelet[2038]: E0209 10:27:28.426647 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.426777 kubelet[2038]: E0209 10:27:28.426764 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.426777 kubelet[2038]: W0209 10:27:28.426773 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426844 kubelet[2038]: E0209 10:27:28.426782 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.426924 kubelet[2038]: E0209 10:27:28.426911 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.426924 kubelet[2038]: W0209 10:27:28.426919 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.426988 kubelet[2038]: E0209 10:27:28.426929 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428000 audit: BPF prog-id=127 op=LOAD Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2517 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332376130353865616461346334343866346133633364633062393333 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2517 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332376130353865616461346334343866346133633364633062393333 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.429000 audit: BPF prog-id=128 op=LOAD Feb 9 10:27:28.429000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2517 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332376130353865616461346334343866346133633364633062393333 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit: BPF prog-id=129 op=LOAD Feb 9 10:27:28.430000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2517 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332376130353865616461346334343866346133633364633062393333 Feb 9 10:27:28.430000 audit: BPF prog-id=129 op=UNLOAD Feb 9 10:27:28.430000 audit: BPF prog-id=128 op=UNLOAD Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.430000 audit: BPF prog-id=130 op=LOAD Feb 9 10:27:28.430000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2517 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332376130353865616461346334343866346133633364633062393333 Feb 9 10:27:28.462843 env[1140]: time="2024-02-09T10:27:28.462794348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c679b5b88-cqrsd,Uid:5d39698e-a33a-46df-b9a0-a9653ac722a3,Namespace:calico-system,Attempt:0,} returns sandbox id \"327a058eada4c448f4a3c3dc0b933783c4d58b246d76162abcfe18000ee06eb2\"" Feb 9 10:27:28.463582 kubelet[2038]: E0209 10:27:28.463561 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:28.464661 env[1140]: time="2024-02-09T10:27:28.464616025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 10:27:28.524645 kubelet[2038]: E0209 10:27:28.524560 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.524645 kubelet[2038]: W0209 10:27:28.524579 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.524645 kubelet[2038]: E0209 10:27:28.524599 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.524806 kubelet[2038]: E0209 10:27:28.524753 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.524806 kubelet[2038]: W0209 10:27:28.524760 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.524806 kubelet[2038]: E0209 10:27:28.524770 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.625374 kubelet[2038]: E0209 10:27:28.625318 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.625374 kubelet[2038]: W0209 10:27:28.625340 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.625534 kubelet[2038]: E0209 10:27:28.625393 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.625654 kubelet[2038]: E0209 10:27:28.625639 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.625654 kubelet[2038]: W0209 10:27:28.625653 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.625728 kubelet[2038]: E0209 10:27:28.625668 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.681709 kubelet[2038]: E0209 10:27:28.681680 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.681709 kubelet[2038]: W0209 10:27:28.681697 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.681709 kubelet[2038]: E0209 10:27:28.681715 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.726295 kubelet[2038]: E0209 10:27:28.726268 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.726295 kubelet[2038]: W0209 10:27:28.726287 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.726508 kubelet[2038]: E0209 10:27:28.726306 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.738376 kubelet[2038]: E0209 10:27:28.738340 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:28.738791 env[1140]: time="2024-02-09T10:27:28.738744130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9tfdj,Uid:9d6d25cb-bc28-4bf5-8cee-06b949f88b66,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:28.750205 env[1140]: time="2024-02-09T10:27:28.750124271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:28.750205 env[1140]: time="2024-02-09T10:27:28.750175755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:28.750205 env[1140]: time="2024-02-09T10:27:28.750194477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:28.750651 env[1140]: time="2024-02-09T10:27:28.750553428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0 pid=2589 runtime=io.containerd.runc.v2 Feb 9 10:27:28.771370 systemd[1]: Started cri-containerd-68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0.scope. Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit: BPF prog-id=131 op=LOAD Feb 9 10:27:28.788000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643837396330323761333530636363363538663035373636626266 Feb 9 10:27:28.788000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.788000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643837396330323761333530636363363538663035373636626266 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit: BPF prog-id=132 op=LOAD Feb 9 10:27:28.789000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643837396330323761333530636363363538663035373636626266 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.789000 audit: BPF prog-id=133 op=LOAD Feb 9 10:27:28.789000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643837396330323761333530636363363538663035373636626266 Feb 9 10:27:28.790000 audit: BPF prog-id=133 op=UNLOAD Feb 9 10:27:28.790000 audit: BPF prog-id=132 op=UNLOAD Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.790000 audit: BPF prog-id=134 op=LOAD Feb 9 10:27:28.790000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643837396330323761333530636363363538663035373636626266 Feb 9 10:27:28.807576 env[1140]: time="2024-02-09T10:27:28.807534859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9tfdj,Uid:9d6d25cb-bc28-4bf5-8cee-06b949f88b66,Namespace:calico-system,Attempt:0,} returns sandbox id \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\"" Feb 9 10:27:28.808568 kubelet[2038]: E0209 10:27:28.808131 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:28.827657 kubelet[2038]: E0209 10:27:28.827635 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.827657 kubelet[2038]: W0209 10:27:28.827652 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.827773 kubelet[2038]: E0209 10:27:28.827672 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:28.883231 kubelet[2038]: E0209 10:27:28.883209 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:28.883231 kubelet[2038]: W0209 10:27:28.883228 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:28.883391 kubelet[2038]: E0209 10:27:28.883246 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:29.043000 audit[2652]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:29.043000 audit[2652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd6fcfb10 a2=0 a3=ffffa6f546c0 items=0 ppid=2217 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:29.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:29.044000 audit[2652]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:29.044000 audit[2652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd6fcfb10 a2=0 a3=ffffa6f546c0 items=0 ppid=2217 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:29.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:29.610372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4079067432.mount: Deactivated successfully. Feb 9 10:27:30.237008 kubelet[2038]: E0209 10:27:30.236705 2038 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:30.522772 env[1140]: time="2024-02-09T10:27:30.522663155Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.524415 env[1140]: time="2024-02-09T10:27:30.524366770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.526160 env[1140]: time="2024-02-09T10:27:30.526124389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.527427 env[1140]: time="2024-02-09T10:27:30.527389609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.527917 env[1140]: time="2024-02-09T10:27:30.527885128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 10:27:30.528668 env[1140]: time="2024-02-09T10:27:30.528644188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 10:27:30.540865 env[1140]: time="2024-02-09T10:27:30.540800988Z" level=info msg="CreateContainer within sandbox \"327a058eada4c448f4a3c3dc0b933783c4d58b246d76162abcfe18000ee06eb2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 10:27:30.651449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount226338606.mount: Deactivated successfully. Feb 9 10:27:30.655670 env[1140]: time="2024-02-09T10:27:30.655628141Z" level=info msg="CreateContainer within sandbox \"327a058eada4c448f4a3c3dc0b933783c4d58b246d76162abcfe18000ee06eb2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"38e3f09df3e3889764dd2cfb9da72cce44a8086c8e4a9075544b093baa93bc73\"" Feb 9 10:27:30.656304 env[1140]: time="2024-02-09T10:27:30.656272711Z" level=info msg="StartContainer for \"38e3f09df3e3889764dd2cfb9da72cce44a8086c8e4a9075544b093baa93bc73\"" Feb 9 10:27:30.671149 systemd[1]: Started cri-containerd-38e3f09df3e3889764dd2cfb9da72cce44a8086c8e4a9075544b093baa93bc73.scope. Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.717000 audit: BPF prog-id=135 op=LOAD Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2517 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653366303964663365333838393736346464326366623964613732 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2517 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653366303964663365333838393736346464326366623964613732 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit: BPF prog-id=136 op=LOAD Feb 9 10:27:30.718000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2517 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653366303964663365333838393736346464326366623964613732 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit: BPF prog-id=137 op=LOAD Feb 9 10:27:30.718000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2517 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653366303964663365333838393736346464326366623964613732 Feb 9 10:27:30.718000 audit: BPF prog-id=137 op=UNLOAD Feb 9 10:27:30.718000 audit: BPF prog-id=136 op=UNLOAD Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.718000 audit: BPF prog-id=138 op=LOAD Feb 9 10:27:30.718000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2517 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653366303964663365333838393736346464326366623964613732 Feb 9 10:27:30.739551 env[1140]: time="2024-02-09T10:27:30.739512088Z" level=info msg="StartContainer for \"38e3f09df3e3889764dd2cfb9da72cce44a8086c8e4a9075544b093baa93bc73\" returns successfully" Feb 9 10:27:31.279847 kubelet[2038]: E0209 10:27:31.279820 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:31.289056 kubelet[2038]: I0209 10:27:31.288848 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6c679b5b88-cqrsd" podStartSLOduration=-9.22337203356596e+09 pod.CreationTimestamp="2024-02-09 10:27:28 +0000 UTC" firstStartedPulling="2024-02-09 10:27:28.464368084 +0000 UTC m=+20.359622907" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:31.288490722 +0000 UTC m=+23.183745545" watchObservedRunningTime="2024-02-09 10:27:31.288816347 +0000 UTC m=+23.184071130" Feb 9 10:27:31.328162 kubelet[2038]: E0209 10:27:31.328142 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.328162 kubelet[2038]: W0209 10:27:31.328160 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.328288 kubelet[2038]: E0209 10:27:31.328175 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.328408 kubelet[2038]: E0209 10:27:31.328397 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.328408 kubelet[2038]: W0209 10:27:31.328409 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.328493 kubelet[2038]: E0209 10:27:31.328419 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.328623 kubelet[2038]: E0209 10:27:31.328609 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.328623 kubelet[2038]: W0209 10:27:31.328620 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.328691 kubelet[2038]: E0209 10:27:31.328630 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.328817 kubelet[2038]: E0209 10:27:31.328806 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.328817 kubelet[2038]: W0209 10:27:31.328817 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.328931 kubelet[2038]: E0209 10:27:31.328828 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.328958 kubelet[2038]: E0209 10:27:31.328953 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.328987 kubelet[2038]: W0209 10:27:31.328959 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.328987 kubelet[2038]: E0209 10:27:31.328968 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.329114 kubelet[2038]: E0209 10:27:31.329105 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.329114 kubelet[2038]: W0209 10:27:31.329114 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.329172 kubelet[2038]: E0209 10:27:31.329123 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.329302 kubelet[2038]: E0209 10:27:31.329292 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.329302 kubelet[2038]: W0209 10:27:31.329302 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.329409 kubelet[2038]: E0209 10:27:31.329312 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.329470 kubelet[2038]: E0209 10:27:31.329449 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.329470 kubelet[2038]: W0209 10:27:31.329467 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.329537 kubelet[2038]: E0209 10:27:31.329477 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.329609 kubelet[2038]: E0209 10:27:31.329600 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.329609 kubelet[2038]: W0209 10:27:31.329608 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.329675 kubelet[2038]: E0209 10:27:31.329618 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.329760 kubelet[2038]: E0209 10:27:31.329751 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.329760 kubelet[2038]: W0209 10:27:31.329760 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.329819 kubelet[2038]: E0209 10:27:31.329769 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.329896 kubelet[2038]: E0209 10:27:31.329888 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.329896 kubelet[2038]: W0209 10:27:31.329896 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.329966 kubelet[2038]: E0209 10:27:31.329905 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.330028 kubelet[2038]: E0209 10:27:31.330020 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.330028 kubelet[2038]: W0209 10:27:31.330028 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.330087 kubelet[2038]: E0209 10:27:31.330037 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.344516 kubelet[2038]: E0209 10:27:31.344407 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.344516 kubelet[2038]: W0209 10:27:31.344421 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.344516 kubelet[2038]: E0209 10:27:31.344435 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.344664 kubelet[2038]: E0209 10:27:31.344598 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.344664 kubelet[2038]: W0209 10:27:31.344606 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.344664 kubelet[2038]: E0209 10:27:31.344620 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.344779 kubelet[2038]: E0209 10:27:31.344765 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.344779 kubelet[2038]: W0209 10:27:31.344775 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.344847 kubelet[2038]: E0209 10:27:31.344789 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.345002 kubelet[2038]: E0209 10:27:31.344975 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.345002 kubelet[2038]: W0209 10:27:31.344986 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.345002 kubelet[2038]: E0209 10:27:31.345000 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.345142 kubelet[2038]: E0209 10:27:31.345130 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.345142 kubelet[2038]: W0209 10:27:31.345139 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.345205 kubelet[2038]: E0209 10:27:31.345153 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.345271 kubelet[2038]: E0209 10:27:31.345260 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.345271 kubelet[2038]: W0209 10:27:31.345268 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.345333 kubelet[2038]: E0209 10:27:31.345280 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.345442 kubelet[2038]: E0209 10:27:31.345431 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.345442 kubelet[2038]: W0209 10:27:31.345440 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.345519 kubelet[2038]: E0209 10:27:31.345454 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.345738 kubelet[2038]: E0209 10:27:31.345722 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.345824 kubelet[2038]: W0209 10:27:31.345810 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.345900 kubelet[2038]: E0209 10:27:31.345888 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.346056 kubelet[2038]: E0209 10:27:31.346040 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.346056 kubelet[2038]: W0209 10:27:31.346051 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.346118 kubelet[2038]: E0209 10:27:31.346067 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.346198 kubelet[2038]: E0209 10:27:31.346187 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.346198 kubelet[2038]: W0209 10:27:31.346196 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.346250 kubelet[2038]: E0209 10:27:31.346208 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.346326 kubelet[2038]: E0209 10:27:31.346317 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.346326 kubelet[2038]: W0209 10:27:31.346325 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.346403 kubelet[2038]: E0209 10:27:31.346337 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.346525 kubelet[2038]: E0209 10:27:31.346512 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.346525 kubelet[2038]: W0209 10:27:31.346523 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.346579 kubelet[2038]: E0209 10:27:31.346535 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.346798 kubelet[2038]: E0209 10:27:31.346773 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.346798 kubelet[2038]: W0209 10:27:31.346786 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.346854 kubelet[2038]: E0209 10:27:31.346814 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.346920 kubelet[2038]: E0209 10:27:31.346908 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.346920 kubelet[2038]: W0209 10:27:31.346920 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.346992 kubelet[2038]: E0209 10:27:31.346980 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.347050 kubelet[2038]: E0209 10:27:31.347041 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.347050 kubelet[2038]: W0209 10:27:31.347049 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.347112 kubelet[2038]: E0209 10:27:31.347058 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.347186 kubelet[2038]: E0209 10:27:31.347177 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.347186 kubelet[2038]: W0209 10:27:31.347186 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.347246 kubelet[2038]: E0209 10:27:31.347194 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.347333 kubelet[2038]: E0209 10:27:31.347324 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.347333 kubelet[2038]: W0209 10:27:31.347333 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.347410 kubelet[2038]: E0209 10:27:31.347343 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.347758 kubelet[2038]: E0209 10:27:31.347745 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:31.347758 kubelet[2038]: W0209 10:27:31.347757 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:31.347820 kubelet[2038]: E0209 10:27:31.347769 2038 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:31.801526 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3599952632.mount: Deactivated successfully. Feb 9 10:27:31.884222 env[1140]: time="2024-02-09T10:27:31.884180687Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:31.886126 env[1140]: time="2024-02-09T10:27:31.886096432Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:31.887728 env[1140]: time="2024-02-09T10:27:31.887701354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:31.888978 env[1140]: time="2024-02-09T10:27:31.888942848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:31.889530 env[1140]: time="2024-02-09T10:27:31.889486769Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 10:27:31.891392 env[1140]: time="2024-02-09T10:27:31.891319788Z" level=info msg="CreateContainer within sandbox \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 10:27:31.901697 env[1140]: time="2024-02-09T10:27:31.901655811Z" level=info msg="CreateContainer within sandbox \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0\"" Feb 9 10:27:31.902036 env[1140]: time="2024-02-09T10:27:31.902013278Z" level=info msg="StartContainer for \"1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0\"" Feb 9 10:27:31.923333 systemd[1]: Started cri-containerd-1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0.scope. Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:31.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633331616338363831366535343835336265613934663865336664 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit: BPF prog-id=139 op=LOAD Feb 9 10:27:31.945000 audit[2735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:31.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633331616338363831366535343835336265613934663865336664 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit: BPF prog-id=140 op=LOAD Feb 9 10:27:31.945000 audit[2735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:31.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633331616338363831366535343835336265613934663865336664 Feb 9 10:27:31.945000 audit: BPF prog-id=140 op=UNLOAD Feb 9 10:27:31.945000 audit: BPF prog-id=139 op=UNLOAD Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:31.945000 audit: BPF prog-id=141 op=LOAD Feb 9 10:27:31.945000 audit[2735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:31.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633331616338363831366535343835336265613934663865336664 Feb 9 10:27:31.961585 env[1140]: time="2024-02-09T10:27:31.961538987Z" level=info msg="StartContainer for \"1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0\" returns successfully" Feb 9 10:27:31.965790 systemd[1]: cri-containerd-1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0.scope: Deactivated successfully. Feb 9 10:27:31.972000 audit: BPF prog-id=141 op=UNLOAD Feb 9 10:27:32.010832 env[1140]: time="2024-02-09T10:27:32.010709683Z" level=info msg="shim disconnected" id=1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0 Feb 9 10:27:32.010832 env[1140]: time="2024-02-09T10:27:32.010810731Z" level=warning msg="cleaning up after shim disconnected" id=1ac31ac86816e54853bea94f8e3fd4699d3bbc0e4a52917f6b1e0fa2555f7ad0 namespace=k8s.io Feb 9 10:27:32.011227 env[1140]: time="2024-02-09T10:27:32.011068030Z" level=info msg="cleaning up dead shim" Feb 9 10:27:32.018846 env[1140]: time="2024-02-09T10:27:32.018782550Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:27:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2773 runtime=io.containerd.runc.v2\n" Feb 9 10:27:32.237071 kubelet[2038]: E0209 10:27:32.236950 2038 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:32.281896 kubelet[2038]: I0209 10:27:32.281873 2038 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:27:32.282827 kubelet[2038]: E0209 10:27:32.282403 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:32.282827 kubelet[2038]: E0209 10:27:32.282680 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:32.283294 env[1140]: time="2024-02-09T10:27:32.283261698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 10:27:33.707729 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount665956680.mount: Deactivated successfully. Feb 9 10:27:34.235620 kubelet[2038]: E0209 10:27:34.235544 2038 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:35.901265 env[1140]: time="2024-02-09T10:27:35.901202552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:35.902748 env[1140]: time="2024-02-09T10:27:35.902712650Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:35.904374 env[1140]: time="2024-02-09T10:27:35.904334434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:35.905706 env[1140]: time="2024-02-09T10:27:35.905674841Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:35.906135 env[1140]: time="2024-02-09T10:27:35.906096588Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 10:27:35.910128 env[1140]: time="2024-02-09T10:27:35.909789187Z" level=info msg="CreateContainer within sandbox \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 10:27:35.923293 env[1140]: time="2024-02-09T10:27:35.923246297Z" level=info msg="CreateContainer within sandbox \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215\"" Feb 9 10:27:35.924515 env[1140]: time="2024-02-09T10:27:35.923827655Z" level=info msg="StartContainer for \"e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215\"" Feb 9 10:27:35.947449 systemd[1]: Started cri-containerd-e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215.scope. Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983946 kernel: kauditd_printk_skb: 223 callbacks suppressed Feb 9 10:27:35.984036 kernel: audit: type=1400 audit(1707474455.981:1142): avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.984065 kernel: audit: type=1300 audit(1707474455.981:1142): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2589 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:35.981000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2589 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:35.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656638336364303665376636643038316239333737663733333839 Feb 9 10:27:35.988982 kernel: audit: type=1327 audit(1707474455.981:1142): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656638336364303665376636643038316239333737663733333839 Feb 9 10:27:35.989029 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.992580 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.992646 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.994227 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.998122 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.998191 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:36.001696 kernel: audit: type=1400 audit(1707474455.981:1143): avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit: BPF prog-id=142 op=LOAD Feb 9 10:27:35.981000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2589 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:35.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656638336364303665376636643038316239333737663733333839 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.981000 audit: BPF prog-id=143 op=LOAD Feb 9 10:27:35.981000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2589 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:35.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656638336364303665376636643038316239333737663733333839 Feb 9 10:27:35.983000 audit: BPF prog-id=143 op=UNLOAD Feb 9 10:27:35.983000 audit: BPF prog-id=142 op=UNLOAD Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.983000 audit: BPF prog-id=144 op=LOAD Feb 9 10:27:35.983000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2589 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:35.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656638336364303665376636643038316239333737663733333839 Feb 9 10:27:36.031380 env[1140]: time="2024-02-09T10:27:36.031326211Z" level=info msg="StartContainer for \"e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215\" returns successfully" Feb 9 10:27:36.236045 kubelet[2038]: E0209 10:27:36.235640 2038 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:36.290292 kubelet[2038]: E0209 10:27:36.290209 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:36.624314 env[1140]: time="2024-02-09T10:27:36.624256503Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:27:36.627584 systemd[1]: cri-containerd-e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215.scope: Deactivated successfully. Feb 9 10:27:36.633000 audit: BPF prog-id=144 op=UNLOAD Feb 9 10:27:36.641133 kubelet[2038]: I0209 10:27:36.641101 2038 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 10:27:36.650186 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215-rootfs.mount: Deactivated successfully. Feb 9 10:27:36.656746 env[1140]: time="2024-02-09T10:27:36.656702724Z" level=info msg="shim disconnected" id=e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215 Feb 9 10:27:36.656966 env[1140]: time="2024-02-09T10:27:36.656944859Z" level=warning msg="cleaning up after shim disconnected" id=e6ef83cd06e7f6d081b9377f733894fe4b408b6aef39a4f2e6c1be197368e215 namespace=k8s.io Feb 9 10:27:36.657086 env[1140]: time="2024-02-09T10:27:36.657071707Z" level=info msg="cleaning up dead shim" Feb 9 10:27:36.662774 kubelet[2038]: I0209 10:27:36.662744 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:36.664175 kubelet[2038]: I0209 10:27:36.663897 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:36.665371 kubelet[2038]: I0209 10:27:36.665108 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:36.669870 systemd[1]: Created slice kubepods-burstable-pod852ad547_793e_4a28_982d_f137e769ded6.slice. Feb 9 10:27:36.675299 systemd[1]: Created slice kubepods-burstable-podd29bc2dd_0ddc_4f4c_8687_28b21c3fb8c5.slice. Feb 9 10:27:36.676824 env[1140]: time="2024-02-09T10:27:36.676766173Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:27:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2846 runtime=io.containerd.runc.v2\n" Feb 9 10:27:36.680964 systemd[1]: Created slice kubepods-besteffort-pod67c8e069_7d42_4bda_915d_6e04f81cc4ad.slice. Feb 9 10:27:36.790434 kubelet[2038]: I0209 10:27:36.790400 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5-config-volume\") pod \"coredns-787d4945fb-85s2t\" (UID: \"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5\") " pod="kube-system/coredns-787d4945fb-85s2t" Feb 9 10:27:36.790571 kubelet[2038]: I0209 10:27:36.790469 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmdmx\" (UniqueName: \"kubernetes.io/projected/852ad547-793e-4a28-982d-f137e769ded6-kube-api-access-hmdmx\") pod \"coredns-787d4945fb-5k7xd\" (UID: \"852ad547-793e-4a28-982d-f137e769ded6\") " pod="kube-system/coredns-787d4945fb-5k7xd" Feb 9 10:27:36.790571 kubelet[2038]: I0209 10:27:36.790519 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2rj7\" (UniqueName: \"kubernetes.io/projected/d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5-kube-api-access-j2rj7\") pod \"coredns-787d4945fb-85s2t\" (UID: \"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5\") " pod="kube-system/coredns-787d4945fb-85s2t" Feb 9 10:27:36.790571 kubelet[2038]: I0209 10:27:36.790541 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/852ad547-793e-4a28-982d-f137e769ded6-config-volume\") pod \"coredns-787d4945fb-5k7xd\" (UID: \"852ad547-793e-4a28-982d-f137e769ded6\") " pod="kube-system/coredns-787d4945fb-5k7xd" Feb 9 10:27:36.790571 kubelet[2038]: I0209 10:27:36.790563 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67c8e069-7d42-4bda-915d-6e04f81cc4ad-tigera-ca-bundle\") pod \"calico-kube-controllers-54647fd667-wwwmb\" (UID: \"67c8e069-7d42-4bda-915d-6e04f81cc4ad\") " pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" Feb 9 10:27:36.790680 kubelet[2038]: I0209 10:27:36.790586 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7x27l\" (UniqueName: \"kubernetes.io/projected/67c8e069-7d42-4bda-915d-6e04f81cc4ad-kube-api-access-7x27l\") pod \"calico-kube-controllers-54647fd667-wwwmb\" (UID: \"67c8e069-7d42-4bda-915d-6e04f81cc4ad\") " pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" Feb 9 10:27:36.972920 kubelet[2038]: E0209 10:27:36.972845 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:36.974281 env[1140]: time="2024-02-09T10:27:36.974230262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5k7xd,Uid:852ad547-793e-4a28-982d-f137e769ded6,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:36.980596 kubelet[2038]: E0209 10:27:36.980558 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:36.981743 env[1140]: time="2024-02-09T10:27:36.981700247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-85s2t,Uid:d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:36.983663 env[1140]: time="2024-02-09T10:27:36.983625087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54647fd667-wwwmb,Uid:67c8e069-7d42-4bda-915d-6e04f81cc4ad,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:37.198134 env[1140]: time="2024-02-09T10:27:37.198055046Z" level=error msg="Failed to destroy network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.198578 env[1140]: time="2024-02-09T10:27:37.198475311Z" level=error msg="encountered an error cleaning up failed sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.198578 env[1140]: time="2024-02-09T10:27:37.198527835Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5k7xd,Uid:852ad547-793e-4a28-982d-f137e769ded6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.199336 kubelet[2038]: E0209 10:27:37.199205 2038 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.199336 kubelet[2038]: E0209 10:27:37.199271 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-5k7xd" Feb 9 10:27:37.199847 kubelet[2038]: E0209 10:27:37.199554 2038 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-5k7xd" Feb 9 10:27:37.199847 kubelet[2038]: E0209 10:27:37.199625 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-5k7xd_kube-system(852ad547-793e-4a28-982d-f137e769ded6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-5k7xd_kube-system(852ad547-793e-4a28-982d-f137e769ded6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-5k7xd" podUID=852ad547-793e-4a28-982d-f137e769ded6 Feb 9 10:27:37.201016 env[1140]: time="2024-02-09T10:27:37.200978502Z" level=error msg="Failed to destroy network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.201310 env[1140]: time="2024-02-09T10:27:37.201267719Z" level=error msg="encountered an error cleaning up failed sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.201380 env[1140]: time="2024-02-09T10:27:37.201318642Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54647fd667-wwwmb,Uid:67c8e069-7d42-4bda-915d-6e04f81cc4ad,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.201588 kubelet[2038]: E0209 10:27:37.201543 2038 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.201588 kubelet[2038]: E0209 10:27:37.201582 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" Feb 9 10:27:37.201681 kubelet[2038]: E0209 10:27:37.201600 2038 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" Feb 9 10:27:37.201681 kubelet[2038]: E0209 10:27:37.201644 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-54647fd667-wwwmb_calico-system(67c8e069-7d42-4bda-915d-6e04f81cc4ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-54647fd667-wwwmb_calico-system(67c8e069-7d42-4bda-915d-6e04f81cc4ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" podUID=67c8e069-7d42-4bda-915d-6e04f81cc4ad Feb 9 10:27:37.207394 env[1140]: time="2024-02-09T10:27:37.207344524Z" level=error msg="Failed to destroy network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.207764 env[1140]: time="2024-02-09T10:27:37.207727747Z" level=error msg="encountered an error cleaning up failed sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.207890 env[1140]: time="2024-02-09T10:27:37.207860315Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-85s2t,Uid:d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.208394 kubelet[2038]: E0209 10:27:37.208070 2038 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.208394 kubelet[2038]: E0209 10:27:37.208107 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-85s2t" Feb 9 10:27:37.208394 kubelet[2038]: E0209 10:27:37.208125 2038 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-85s2t" Feb 9 10:27:37.208594 kubelet[2038]: E0209 10:27:37.208160 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-85s2t_kube-system(d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-85s2t_kube-system(d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-85s2t" podUID=d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5 Feb 9 10:27:37.293353 kubelet[2038]: E0209 10:27:37.293312 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:37.294370 env[1140]: time="2024-02-09T10:27:37.294297668Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 10:27:37.296238 kubelet[2038]: I0209 10:27:37.296212 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:27:37.296971 env[1140]: time="2024-02-09T10:27:37.296922906Z" level=info msg="StopPodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\"" Feb 9 10:27:37.298237 kubelet[2038]: I0209 10:27:37.297930 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:27:37.298583 env[1140]: time="2024-02-09T10:27:37.298549604Z" level=info msg="StopPodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\"" Feb 9 10:27:37.299460 kubelet[2038]: I0209 10:27:37.299107 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:27:37.299795 env[1140]: time="2024-02-09T10:27:37.299751396Z" level=info msg="StopPodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\"" Feb 9 10:27:37.331588 env[1140]: time="2024-02-09T10:27:37.331530425Z" level=error msg="StopPodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" failed" error="failed to destroy network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.331838 kubelet[2038]: E0209 10:27:37.331810 2038 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:27:37.331914 kubelet[2038]: E0209 10:27:37.331881 2038 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52} Feb 9 10:27:37.331949 kubelet[2038]: E0209 10:27:37.331922 2038 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"852ad547-793e-4a28-982d-f137e769ded6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:37.332011 kubelet[2038]: E0209 10:27:37.331952 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"852ad547-793e-4a28-982d-f137e769ded6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-5k7xd" podUID=852ad547-793e-4a28-982d-f137e769ded6 Feb 9 10:27:37.332414 env[1140]: time="2024-02-09T10:27:37.332371436Z" level=error msg="StopPodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" failed" error="failed to destroy network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.332556 kubelet[2038]: E0209 10:27:37.332536 2038 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:27:37.332614 kubelet[2038]: E0209 10:27:37.332568 2038 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776} Feb 9 10:27:37.332614 kubelet[2038]: E0209 10:27:37.332596 2038 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:37.332688 kubelet[2038]: E0209 10:27:37.332620 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-85s2t" podUID=d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5 Feb 9 10:27:37.334122 env[1140]: time="2024-02-09T10:27:37.334073858Z" level=error msg="StopPodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" failed" error="failed to destroy network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:37.334253 kubelet[2038]: E0209 10:27:37.334228 2038 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:27:37.334306 kubelet[2038]: E0209 10:27:37.334255 2038 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350} Feb 9 10:27:37.334306 kubelet[2038]: E0209 10:27:37.334285 2038 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"67c8e069-7d42-4bda-915d-6e04f81cc4ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:37.334397 kubelet[2038]: E0209 10:27:37.334318 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"67c8e069-7d42-4bda-915d-6e04f81cc4ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" podUID=67c8e069-7d42-4bda-915d-6e04f81cc4ad Feb 9 10:27:37.705819 kubelet[2038]: I0209 10:27:37.705096 2038 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:27:37.705819 kubelet[2038]: E0209 10:27:37.705679 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:37.751000 audit[3075]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:37.751000 audit[3075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffcda7c530 a2=0 a3=ffffa17df6c0 items=0 ppid=2217 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:37.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:37.752000 audit[3075]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:37.752000 audit[3075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffcda7c530 a2=0 a3=ffffa17df6c0 items=0 ppid=2217 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:37.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:37.918930 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350-shm.mount: Deactivated successfully. Feb 9 10:27:37.919021 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52-shm.mount: Deactivated successfully. Feb 9 10:27:38.239302 systemd[1]: Created slice kubepods-besteffort-pode7733a2d_55f9_40e4_9366_0a67823fa03e.slice. Feb 9 10:27:38.240911 env[1140]: time="2024-02-09T10:27:38.240863360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmz4b,Uid:e7733a2d-55f9-40e4-9366-0a67823fa03e,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:38.287122 env[1140]: time="2024-02-09T10:27:38.287068960Z" level=error msg="Failed to destroy network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:38.288835 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3-shm.mount: Deactivated successfully. Feb 9 10:27:38.289440 env[1140]: time="2024-02-09T10:27:38.289405256Z" level=error msg="encountered an error cleaning up failed sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:38.289581 env[1140]: time="2024-02-09T10:27:38.289554545Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmz4b,Uid:e7733a2d-55f9-40e4-9366-0a67823fa03e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:38.289836 kubelet[2038]: E0209 10:27:38.289815 2038 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:38.289920 kubelet[2038]: E0209 10:27:38.289868 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:38.289920 kubelet[2038]: E0209 10:27:38.289899 2038 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kmz4b" Feb 9 10:27:38.289979 kubelet[2038]: E0209 10:27:38.289949 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kmz4b_calico-system(e7733a2d-55f9-40e4-9366-0a67823fa03e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kmz4b_calico-system(e7733a2d-55f9-40e4-9366-0a67823fa03e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:38.303533 kubelet[2038]: E0209 10:27:38.303507 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:38.303785 kubelet[2038]: I0209 10:27:38.303700 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:27:38.307092 env[1140]: time="2024-02-09T10:27:38.304495851Z" level=info msg="StopPodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\"" Feb 9 10:27:38.328338 env[1140]: time="2024-02-09T10:27:38.328285991Z" level=error msg="StopPodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" failed" error="failed to destroy network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:38.328550 kubelet[2038]: E0209 10:27:38.328517 2038 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:27:38.328604 kubelet[2038]: E0209 10:27:38.328553 2038 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3} Feb 9 10:27:38.328604 kubelet[2038]: E0209 10:27:38.328584 2038 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7733a2d-55f9-40e4-9366-0a67823fa03e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:38.328697 kubelet[2038]: E0209 10:27:38.328612 2038 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7733a2d-55f9-40e4-9366-0a67823fa03e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kmz4b" podUID=e7733a2d-55f9-40e4-9366-0a67823fa03e Feb 9 10:27:42.656604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2173739672.mount: Deactivated successfully. Feb 9 10:27:42.957424 env[1140]: time="2024-02-09T10:27:42.957312043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:42.958660 env[1140]: time="2024-02-09T10:27:42.958626670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:42.959654 env[1140]: time="2024-02-09T10:27:42.959623161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:42.960945 env[1140]: time="2024-02-09T10:27:42.960913547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:42.961310 env[1140]: time="2024-02-09T10:27:42.961270725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 10:27:42.972279 env[1140]: time="2024-02-09T10:27:42.972242244Z" level=info msg="CreateContainer within sandbox \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 10:27:42.983941 env[1140]: time="2024-02-09T10:27:42.983897277Z" level=info msg="CreateContainer within sandbox \"68d879c027a350ccc658f05766bbfc8284fa5c39dfeba5122ab6ca6c2b6e5be0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c4cf466bcf7dc13909ed0aa533469f27249da807a10fdeddb2c53bae0f8df8d9\"" Feb 9 10:27:42.985540 env[1140]: time="2024-02-09T10:27:42.985507919Z" level=info msg="StartContainer for \"c4cf466bcf7dc13909ed0aa533469f27249da807a10fdeddb2c53bae0f8df8d9\"" Feb 9 10:27:43.000579 systemd[1]: Started cri-containerd-c4cf466bcf7dc13909ed0aa533469f27249da807a10fdeddb2c53bae0f8df8d9.scope. Feb 9 10:27:43.046833 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 10:27:43.046967 kernel: audit: type=1400 audit(1707474463.044:1151): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2589 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.051079 kernel: audit: type=1300 audit(1707474463.044:1151): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2589 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.051128 kernel: audit: type=1327 audit(1707474463.044:1151): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636634363662636637646331333930396564306161353333343639 Feb 9 10:27:43.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636634363662636637646331333930396564306161353333343639 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.055051 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.055090 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.059125 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.059199 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.062392 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.062437 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.065785 kernel: audit: type=1400 audit(1707474463.044:1152): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit: BPF prog-id=145 op=LOAD Feb 9 10:27:43.044000 audit[3146]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2589 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636634363662636637646331333930396564306161353333343639 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.044000 audit: BPF prog-id=146 op=LOAD Feb 9 10:27:43.044000 audit[3146]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2589 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636634363662636637646331333930396564306161353333343639 Feb 9 10:27:43.045000 audit: BPF prog-id=146 op=UNLOAD Feb 9 10:27:43.045000 audit: BPF prog-id=145 op=UNLOAD Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:43.045000 audit: BPF prog-id=147 op=LOAD Feb 9 10:27:43.045000 audit[3146]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2589 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334636634363662636637646331333930396564306161353333343639 Feb 9 10:27:43.110501 env[1140]: time="2024-02-09T10:27:43.108697353Z" level=info msg="StartContainer for \"c4cf466bcf7dc13909ed0aa533469f27249da807a10fdeddb2c53bae0f8df8d9\" returns successfully" Feb 9 10:27:43.204432 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 10:27:43.204535 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 10:27:43.316615 kubelet[2038]: E0209 10:27:43.316587 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:43.332178 kubelet[2038]: I0209 10:27:43.332122 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-9tfdj" podStartSLOduration=-9.223372021522697e+09 pod.CreationTimestamp="2024-02-09 10:27:28 +0000 UTC" firstStartedPulling="2024-02-09 10:27:28.810438709 +0000 UTC m=+20.705693492" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:43.331268636 +0000 UTC m=+35.226523459" watchObservedRunningTime="2024-02-09 10:27:43.332078436 +0000 UTC m=+35.227333259" Feb 9 10:27:44.317152 kubelet[2038]: E0209 10:27:44.317127 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:44.332260 systemd[1]: run-containerd-runc-k8s.io-c4cf466bcf7dc13909ed0aa533469f27249da807a10fdeddb2c53bae0f8df8d9-runc.5xECN0.mount: Deactivated successfully. Feb 9 10:27:44.465000 audit[3300]: AVC avc: denied { write } for pid=3300 comm="tee" name="fd" dev="proc" ino=20494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.465000 audit[3300]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1a3d97b a2=241 a3=1b6 items=1 ppid=3259 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.465000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 10:27:44.465000 audit: PATH item=0 name="/dev/fd/63" inode=19846 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.465000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.483000 audit[3311]: AVC avc: denied { write } for pid=3311 comm="tee" name="fd" dev="proc" ino=18138 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.483000 audit[3311]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc2dd998b a2=241 a3=1b6 items=1 ppid=3270 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.483000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 10:27:44.483000 audit: PATH item=0 name="/dev/fd/63" inode=20503 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.483000 audit[3307]: AVC avc: denied { write } for pid=3307 comm="tee" name="fd" dev="proc" ino=20506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.483000 audit[3307]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca69b98c a2=241 a3=1b6 items=1 ppid=3258 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.483000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 10:27:44.483000 audit: PATH item=0 name="/dev/fd/63" inode=19847 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.500000 audit[3327]: AVC avc: denied { write } for pid=3327 comm="tee" name="fd" dev="proc" ino=19862 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.500000 audit[3327]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce12b98d a2=241 a3=1b6 items=1 ppid=3265 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.500000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 10:27:44.500000 audit: PATH item=0 name="/dev/fd/63" inode=18147 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.500000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.501000 audit[3332]: AVC avc: denied { write } for pid=3332 comm="tee" name="fd" dev="proc" ino=19124 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.501000 audit[3332]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6fd497c a2=241 a3=1b6 items=1 ppid=3266 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.501000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 10:27:44.501000 audit: PATH item=0 name="/dev/fd/63" inode=18150 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.501000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.514000 audit[3336]: AVC avc: denied { write } for pid=3336 comm="tee" name="fd" dev="proc" ino=19131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.514000 audit[3336]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde88398b a2=241 a3=1b6 items=1 ppid=3271 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.514000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 10:27:44.514000 audit: PATH item=0 name="/dev/fd/63" inode=20517 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.514000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.514000 audit[3325]: AVC avc: denied { write } for pid=3325 comm="tee" name="fd" dev="proc" ino=20521 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:44.514000 audit[3325]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5ba898b a2=241 a3=1b6 items=1 ppid=3257 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.514000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 10:27:44.514000 audit: PATH item=0 name="/dev/fd/63" inode=19854 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:44.514000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit: BPF prog-id=148 op=LOAD Feb 9 10:27:44.732000 audit[3405]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe06e4d58 a2=70 a3=0 items=0 ppid=3261 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.732000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:44.732000 audit: BPF prog-id=148 op=UNLOAD Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit: BPF prog-id=149 op=LOAD Feb 9 10:27:44.732000 audit[3405]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe06e4d58 a2=70 a3=4a174c items=0 ppid=3261 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.732000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:44.732000 audit: BPF prog-id=149 op=UNLOAD Feb 9 10:27:44.732000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.732000 audit[3405]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe06e4d88 a2=70 a3=a02b79f items=0 ppid=3261 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.732000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.733000 audit: BPF prog-id=150 op=LOAD Feb 9 10:27:44.733000 audit[3405]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe06e4cd8 a2=70 a3=a02b7b9 items=0 ppid=3261 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.733000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:44.735000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.735000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffce3dfcf8 a2=70 a3=0 items=0 ppid=3261 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.735000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:27:44.736000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:44.736000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffce3dfbd8 a2=70 a3=2 items=0 ppid=3261 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.736000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:27:44.748000 audit: BPF prog-id=150 op=UNLOAD Feb 9 10:27:44.782000 audit[3432]: NETFILTER_CFG table=raw:111 family=2 entries=19 op=nft_register_chain pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:44.782000 audit[3432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffff29e19b0 a2=0 a3=ffffb0b0ffa8 items=0 ppid=3261 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.782000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:44.787000 audit[3441]: NETFILTER_CFG table=mangle:112 family=2 entries=19 op=nft_register_chain pid=3441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:44.787000 audit[3441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe9f4d120 a2=0 a3=ffff9b8ebfa8 items=0 ppid=3261 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:44.788000 audit[3440]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_chain pid=3440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:44.788000 audit[3440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffe5d78ce0 a2=0 a3=ffffb0a7efa8 items=0 ppid=3261 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:44.791000 audit[3443]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:44.791000 audit[3443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffc8ce7050 a2=0 a3=ffff8a5a3fa8 items=0 ppid=3261 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:44.791000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:45.643271 systemd-networkd[1040]: vxlan.calico: Link UP Feb 9 10:27:45.643279 systemd-networkd[1040]: vxlan.calico: Gained carrier Feb 9 10:27:46.884471 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL Feb 9 10:27:48.236876 env[1140]: time="2024-02-09T10:27:48.236828036Z" level=info msg="StopPodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\"" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.342 [INFO][3469] k8s.go 578: Cleaning up netns ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.343 [INFO][3469] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" iface="eth0" netns="/var/run/netns/cni-05981e0e-7034-5532-b298-408f514aedbf" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.343 [INFO][3469] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" iface="eth0" netns="/var/run/netns/cni-05981e0e-7034-5532-b298-408f514aedbf" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.344 [INFO][3469] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" iface="eth0" netns="/var/run/netns/cni-05981e0e-7034-5532-b298-408f514aedbf" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.344 [INFO][3469] k8s.go 585: Releasing IP address(es) ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.344 [INFO][3469] utils.go 188: Calico CNI releasing IP address ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.433 [INFO][3478] ipam_plugin.go 415: Releasing address using handleID ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.434 [INFO][3478] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.434 [INFO][3478] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.447 [WARNING][3478] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.447 [INFO][3478] ipam_plugin.go 443: Releasing address using workloadID ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.449 [INFO][3478] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:48.451761 env[1140]: 2024-02-09 10:27:48.450 [INFO][3469] k8s.go 591: Teardown processing complete. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:27:48.452281 env[1140]: time="2024-02-09T10:27:48.451894053Z" level=info msg="TearDown network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" successfully" Feb 9 10:27:48.452281 env[1140]: time="2024-02-09T10:27:48.451926174Z" level=info msg="StopPodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" returns successfully" Feb 9 10:27:48.453087 kubelet[2038]: E0209 10:27:48.452610 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:48.453410 systemd[1]: run-netns-cni\x2d05981e0e\x2d7034\x2d5532\x2db298\x2d408f514aedbf.mount: Deactivated successfully. Feb 9 10:27:48.453999 env[1140]: time="2024-02-09T10:27:48.453944261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-85s2t,Uid:d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5,Namespace:kube-system,Attempt:1,}" Feb 9 10:27:48.586239 systemd-networkd[1040]: cali7556573141f: Link UP Feb 9 10:27:48.587614 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7556573141f: link becomes ready Feb 9 10:27:48.587078 systemd-networkd[1040]: cali7556573141f: Gained carrier Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.518 [INFO][3486] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--787d4945fb--85s2t-eth0 coredns-787d4945fb- kube-system d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5 692 0 2024-02-09 10:27:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-787d4945fb-85s2t eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7556573141f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.519 [INFO][3486] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.545 [INFO][3501] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" HandleID="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.558 [INFO][3501] ipam_plugin.go 268: Auto assigning IP ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" HandleID="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000243a40), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-787d4945fb-85s2t", "timestamp":"2024-02-09 10:27:48.54576251 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.558 [INFO][3501] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.558 [INFO][3501] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.558 [INFO][3501] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.560 [INFO][3501] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.566 [INFO][3501] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.569 [INFO][3501] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.570 [INFO][3501] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.572 [INFO][3501] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.572 [INFO][3501] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.574 [INFO][3501] ipam.go 1682: Creating new handle: k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581 Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.576 [INFO][3501] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.580 [INFO][3501] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.581 [INFO][3501] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" host="localhost" Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.581 [INFO][3501] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:48.601572 env[1140]: 2024-02-09 10:27:48.581 [INFO][3501] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" HandleID="k8s-pod-network.10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.602164 env[1140]: 2024-02-09 10:27:48.584 [INFO][3486] k8s.go 385: Populated endpoint ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--85s2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-787d4945fb-85s2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7556573141f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:48.602164 env[1140]: 2024-02-09 10:27:48.584 [INFO][3486] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.602164 env[1140]: 2024-02-09 10:27:48.584 [INFO][3486] dataplane_linux.go 68: Setting the host side veth name to cali7556573141f ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.602164 env[1140]: 2024-02-09 10:27:48.586 [INFO][3486] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.602164 env[1140]: 2024-02-09 10:27:48.587 [INFO][3486] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--85s2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581", Pod:"coredns-787d4945fb-85s2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7556573141f", MAC:"b2:9e:6d:ed:d9:b6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:48.602164 env[1140]: 2024-02-09 10:27:48.597 [INFO][3486] k8s.go 491: Wrote updated endpoint to datastore ContainerID="10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581" Namespace="kube-system" Pod="coredns-787d4945fb-85s2t" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:27:48.613892 env[1140]: time="2024-02-09T10:27:48.613836973Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:48.613892 env[1140]: time="2024-02-09T10:27:48.613881895Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:48.614031 env[1140]: time="2024-02-09T10:27:48.613898216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:48.614146 env[1140]: time="2024-02-09T10:27:48.614116505Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581 pid=3531 runtime=io.containerd.runc.v2 Feb 9 10:27:48.612000 audit[3532]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:48.616213 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 9 10:27:48.616259 kernel: audit: type=1325 audit(1707474468.612:1177): table=filter:115 family=2 entries=36 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:48.612000 audit[3532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff85d8eb0 a2=0 a3=ffff88380fa8 items=0 ppid=3261 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.612000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:48.623359 kernel: audit: type=1300 audit(1707474468.612:1177): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff85d8eb0 a2=0 a3=ffff88380fa8 items=0 ppid=3261 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.623430 kernel: audit: type=1327 audit(1707474468.612:1177): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:48.629702 systemd[1]: run-containerd-runc-k8s.io-10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581-runc.O43snc.mount: Deactivated successfully. Feb 9 10:27:48.633887 systemd[1]: Started cri-containerd-10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581.scope. Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.655558 kernel: audit: type=1400 audit(1707474468.650:1178): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.655604 kernel: audit: type=1400 audit(1707474468.650:1179): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.655621 kernel: audit: type=1400 audit(1707474468.650:1180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.659072 kernel: audit: type=1400 audit(1707474468.650:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.659112 kernel: audit: type=1400 audit(1707474468.650:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.662618 kernel: audit: type=1400 audit(1707474468.650:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.662648 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.664432 kernel: audit: type=1400 audit(1707474468.650:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.650000 audit: BPF prog-id=151 op=LOAD Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3531 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633438336465363832636631633663313564396532626632346334 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3531 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633438336465363832636631633663313564396532626632346334 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.653000 audit: BPF prog-id=152 op=LOAD Feb 9 10:27:48.653000 audit[3541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3531 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633438336465363832636631633663313564396532626632346334 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.654000 audit: BPF prog-id=153 op=LOAD Feb 9 10:27:48.654000 audit[3541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3531 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633438336465363832636631633663313564396532626632346334 Feb 9 10:27:48.655000 audit: BPF prog-id=153 op=UNLOAD Feb 9 10:27:48.655000 audit: BPF prog-id=152 op=UNLOAD Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.656000 audit: BPF prog-id=154 op=LOAD Feb 9 10:27:48.656000 audit[3541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3531 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633438336465363832636631633663313564396532626632346334 Feb 9 10:27:48.682991 env[1140]: time="2024-02-09T10:27:48.682851036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-85s2t,Uid:d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5,Namespace:kube-system,Attempt:1,} returns sandbox id \"10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581\"" Feb 9 10:27:48.683687 kubelet[2038]: E0209 10:27:48.683666 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:48.685849 env[1140]: time="2024-02-09T10:27:48.685825485Z" level=info msg="CreateContainer within sandbox \"10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:27:48.695908 env[1140]: time="2024-02-09T10:27:48.695876039Z" level=info msg="CreateContainer within sandbox \"10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e7ec1aa6d9338868a3d1a8f68f5aed57e68c0d4ed38d4790955a133614c6051d\"" Feb 9 10:27:48.697165 env[1140]: time="2024-02-09T10:27:48.697132694Z" level=info msg="StartContainer for \"e7ec1aa6d9338868a3d1a8f68f5aed57e68c0d4ed38d4790955a133614c6051d\"" Feb 9 10:27:48.710720 systemd[1]: Started cri-containerd-e7ec1aa6d9338868a3d1a8f68f5aed57e68c0d4ed38d4790955a133614c6051d.scope. Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.730000 audit: BPF prog-id=155 op=LOAD Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3531 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656331616136643933333838363861336431613866363866356165 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3531 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656331616136643933333838363861336431613866363866356165 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit: BPF prog-id=156 op=LOAD Feb 9 10:27:48.731000 audit[3573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3531 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656331616136643933333838363861336431613866363866356165 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit: BPF prog-id=157 op=LOAD Feb 9 10:27:48.731000 audit[3573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3531 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656331616136643933333838363861336431613866363866356165 Feb 9 10:27:48.731000 audit: BPF prog-id=157 op=UNLOAD Feb 9 10:27:48.731000 audit: BPF prog-id=156 op=UNLOAD Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.731000 audit: BPF prog-id=158 op=LOAD Feb 9 10:27:48.731000 audit[3573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3531 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537656331616136643933333838363861336431613866363866356165 Feb 9 10:27:48.747211 env[1140]: time="2024-02-09T10:27:48.747167897Z" level=info msg="StartContainer for \"e7ec1aa6d9338868a3d1a8f68f5aed57e68c0d4ed38d4790955a133614c6051d\" returns successfully" Feb 9 10:27:49.326524 kubelet[2038]: E0209 10:27:49.326495 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:49.331829 systemd[1]: Started sshd@7-10.0.0.3:22-10.0.0.1:40960.service. Feb 9 10:27:49.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.3:22-10.0.0.1:40960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.349933 kubelet[2038]: I0209 10:27:49.349897 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-85s2t" podStartSLOduration=26.349862519 pod.CreationTimestamp="2024-02-09 10:27:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:49.337542879 +0000 UTC m=+41.232797702" watchObservedRunningTime="2024-02-09 10:27:49.349862519 +0000 UTC m=+41.245117302" Feb 9 10:27:49.369000 audit[3608]: USER_ACCT pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.370864 sshd[3608]: Accepted publickey for core from 10.0.0.1 port 40960 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:49.370000 audit[3608]: CRED_ACQ pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.370000 audit[3608]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8c91000 a2=3 a3=1 items=0 ppid=1 pid=3608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:27:49.372179 sshd[3608]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:49.375756 systemd-logind[1124]: New session 8 of user core. Feb 9 10:27:49.376568 systemd[1]: Started session-8.scope. Feb 9 10:27:49.378000 audit[3608]: USER_START pid=3608 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.380000 audit[3637]: CRED_ACQ pid=3637 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.381000 audit[3636]: NETFILTER_CFG table=filter:116 family=2 entries=12 op=nft_register_rule pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:49.381000 audit[3636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffeb34d900 a2=0 a3=ffff85bb86c0 items=0 ppid=2217 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:49.382000 audit[3636]: NETFILTER_CFG table=nat:117 family=2 entries=30 op=nft_register_rule pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:49.382000 audit[3636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffeb34d900 a2=0 a3=ffff85bb86c0 items=0 ppid=2217 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:49.419000 audit[3663]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=3663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:49.419000 audit[3663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff5b57790 a2=0 a3=ffff8c35f6c0 items=0 ppid=2217 pid=3663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:49.420000 audit[3663]: NETFILTER_CFG table=nat:119 family=2 entries=51 op=nft_register_chain pid=3663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:49.420000 audit[3663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=fffff5b57790 a2=0 a3=ffff8c35f6c0 items=0 ppid=2217 pid=3663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:49.511154 sshd[3608]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:49.510000 audit[3608]: USER_END pid=3608 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.510000 audit[3608]: CRED_DISP pid=3608 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:49.513662 systemd[1]: sshd@7-10.0.0.3:22-10.0.0.1:40960.service: Deactivated successfully. Feb 9 10:27:49.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.3:22-10.0.0.1:40960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:49.514344 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 10:27:49.514846 systemd-logind[1124]: Session 8 logged out. Waiting for processes to exit. Feb 9 10:27:49.515453 systemd-logind[1124]: Removed session 8. Feb 9 10:27:49.636502 systemd-networkd[1040]: cali7556573141f: Gained IPv6LL Feb 9 10:27:50.327792 kubelet[2038]: E0209 10:27:50.327771 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:51.235879 env[1140]: time="2024-02-09T10:27:51.235836779Z" level=info msg="StopPodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\"" Feb 9 10:27:51.236155 env[1140]: time="2024-02-09T10:27:51.235840819Z" level=info msg="StopPodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\"" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.285 [INFO][3716] k8s.go 578: Cleaning up netns ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.285 [INFO][3716] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" iface="eth0" netns="/var/run/netns/cni-6d052a6d-2bfd-dae1-441d-1ae11b4c7040" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.285 [INFO][3716] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" iface="eth0" netns="/var/run/netns/cni-6d052a6d-2bfd-dae1-441d-1ae11b4c7040" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.285 [INFO][3716] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" iface="eth0" netns="/var/run/netns/cni-6d052a6d-2bfd-dae1-441d-1ae11b4c7040" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.285 [INFO][3716] k8s.go 585: Releasing IP address(es) ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.285 [INFO][3716] utils.go 188: Calico CNI releasing IP address ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.306 [INFO][3731] ipam_plugin.go 415: Releasing address using handleID ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.306 [INFO][3731] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.306 [INFO][3731] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.315 [WARNING][3731] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.315 [INFO][3731] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.316 [INFO][3731] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:51.319230 env[1140]: 2024-02-09 10:27:51.317 [INFO][3716] k8s.go 591: Teardown processing complete. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:27:51.320484 env[1140]: time="2024-02-09T10:27:51.320443714Z" level=info msg="TearDown network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" successfully" Feb 9 10:27:51.320567 env[1140]: time="2024-02-09T10:27:51.320550478Z" level=info msg="StopPodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" returns successfully" Feb 9 10:27:51.321373 kubelet[2038]: E0209 10:27:51.320881 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:51.320925 systemd[1]: run-netns-cni\x2d6d052a6d\x2d2bfd\x2ddae1\x2d441d\x2d1ae11b4c7040.mount: Deactivated successfully. Feb 9 10:27:51.321706 env[1140]: time="2024-02-09T10:27:51.321547559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5k7xd,Uid:852ad547-793e-4a28-982d-f137e769ded6,Namespace:kube-system,Attempt:1,}" Feb 9 10:27:51.329343 kubelet[2038]: E0209 10:27:51.328980 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.284 [INFO][3715] k8s.go 578: Cleaning up netns ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.284 [INFO][3715] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" iface="eth0" netns="/var/run/netns/cni-69324dec-5481-3f95-cbce-df81a2ad70de" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.286 [INFO][3715] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" iface="eth0" netns="/var/run/netns/cni-69324dec-5481-3f95-cbce-df81a2ad70de" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.286 [INFO][3715] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" iface="eth0" netns="/var/run/netns/cni-69324dec-5481-3f95-cbce-df81a2ad70de" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.286 [INFO][3715] k8s.go 585: Releasing IP address(es) ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.286 [INFO][3715] utils.go 188: Calico CNI releasing IP address ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.306 [INFO][3732] ipam_plugin.go 415: Releasing address using handleID ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.306 [INFO][3732] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.316 [INFO][3732] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.328 [WARNING][3732] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.328 [INFO][3732] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.330 [INFO][3732] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:51.335338 env[1140]: 2024-02-09 10:27:51.333 [INFO][3715] k8s.go 591: Teardown processing complete. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:27:51.335787 env[1140]: time="2024-02-09T10:27:51.335464920Z" level=info msg="TearDown network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" successfully" Feb 9 10:27:51.335787 env[1140]: time="2024-02-09T10:27:51.335495841Z" level=info msg="StopPodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" returns successfully" Feb 9 10:27:51.337029 systemd[1]: run-netns-cni\x2d69324dec\x2d5481\x2d3f95\x2dcbce\x2ddf81a2ad70de.mount: Deactivated successfully. Feb 9 10:27:51.339312 env[1140]: time="2024-02-09T10:27:51.339282634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmz4b,Uid:e7733a2d-55f9-40e4-9366-0a67823fa03e,Namespace:calico-system,Attempt:1,}" Feb 9 10:27:51.446889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:27:51.447095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieb2e1779ec2: link becomes ready Feb 9 10:27:51.445805 systemd-networkd[1040]: calieb2e1779ec2: Link UP Feb 9 10:27:51.446879 systemd-networkd[1040]: calieb2e1779ec2: Gained carrier Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.373 [INFO][3746] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--787d4945fb--5k7xd-eth0 coredns-787d4945fb- kube-system 852ad547-793e-4a28-982d-f137e769ded6 742 0 2024-02-09 10:27:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-787d4945fb-5k7xd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calieb2e1779ec2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.373 [INFO][3746] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.403 [INFO][3775] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" HandleID="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.421 [INFO][3775] ipam_plugin.go 268: Auto assigning IP ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" HandleID="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400021f920), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-787d4945fb-5k7xd", "timestamp":"2024-02-09 10:27:51.403379741 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.421 [INFO][3775] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.421 [INFO][3775] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.421 [INFO][3775] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.423 [INFO][3775] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.426 [INFO][3775] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.429 [INFO][3775] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.431 [INFO][3775] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.432 [INFO][3775] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.433 [INFO][3775] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.434 [INFO][3775] ipam.go 1682: Creating new handle: k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.436 [INFO][3775] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.440 [INFO][3775] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.440 [INFO][3775] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" host="localhost" Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.440 [INFO][3775] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:51.459048 env[1140]: 2024-02-09 10:27:51.440 [INFO][3775] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" HandleID="k8s-pod-network.b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.459706 env[1140]: 2024-02-09 10:27:51.443 [INFO][3746] k8s.go 385: Populated endpoint ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--5k7xd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"852ad547-793e-4a28-982d-f137e769ded6", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-787d4945fb-5k7xd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb2e1779ec2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:51.459706 env[1140]: 2024-02-09 10:27:51.443 [INFO][3746] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.459706 env[1140]: 2024-02-09 10:27:51.443 [INFO][3746] dataplane_linux.go 68: Setting the host side veth name to calieb2e1779ec2 ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.459706 env[1140]: 2024-02-09 10:27:51.447 [INFO][3746] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.459706 env[1140]: 2024-02-09 10:27:51.448 [INFO][3746] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--5k7xd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"852ad547-793e-4a28-982d-f137e769ded6", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c", Pod:"coredns-787d4945fb-5k7xd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb2e1779ec2", MAC:"12:cb:79:97:c5:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:51.459706 env[1140]: 2024-02-09 10:27:51.455 [INFO][3746] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c" Namespace="kube-system" Pod="coredns-787d4945fb-5k7xd" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:27:51.467000 audit[3809]: NETFILTER_CFG table=filter:120 family=2 entries=30 op=nft_register_chain pid=3809 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:51.467000 audit[3809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=ffffd369d2f0 a2=0 a3=ffff9c5b4fa8 items=0 ppid=3261 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.467000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:51.470824 env[1140]: time="2024-02-09T10:27:51.470698138Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:51.470902 env[1140]: time="2024-02-09T10:27:51.470850664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:51.470902 env[1140]: time="2024-02-09T10:27:51.470879785Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:51.471126 env[1140]: time="2024-02-09T10:27:51.471094674Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c pid=3814 runtime=io.containerd.runc.v2 Feb 9 10:27:51.485139 systemd-networkd[1040]: cali715164ab93a: Link UP Feb 9 10:27:51.489724 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali715164ab93a: link becomes ready Feb 9 10:27:51.487029 systemd-networkd[1040]: cali715164ab93a: Gained carrier Feb 9 10:27:51.503811 systemd[1]: Started cri-containerd-b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c.scope. Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.386 [INFO][3759] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--kmz4b-eth0 csi-node-driver- calico-system e7733a2d-55f9-40e4-9366-0a67823fa03e 741 0 2024-02-09 10:27:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-kmz4b eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali715164ab93a [] []}} ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.387 [INFO][3759] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.412 [INFO][3780] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" HandleID="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.424 [INFO][3780] ipam_plugin.go 268: Auto assigning IP ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" HandleID="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400061b4b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-kmz4b", "timestamp":"2024-02-09 10:27:51.412729519 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.424 [INFO][3780] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.441 [INFO][3780] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.441 [INFO][3780] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.443 [INFO][3780] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.448 [INFO][3780] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.460 [INFO][3780] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.464 [INFO][3780] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.467 [INFO][3780] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.467 [INFO][3780] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.470 [INFO][3780] ipam.go 1682: Creating new handle: k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444 Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.474 [INFO][3780] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.478 [INFO][3780] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.478 [INFO][3780] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" host="localhost" Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.478 [INFO][3780] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:51.509178 env[1140]: 2024-02-09 10:27:51.478 [INFO][3780] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" HandleID="k8s-pod-network.bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.509724 env[1140]: 2024-02-09 10:27:51.482 [INFO][3759] k8s.go 385: Populated endpoint ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmz4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7733a2d-55f9-40e4-9366-0a67823fa03e", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-kmz4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali715164ab93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:51.509724 env[1140]: 2024-02-09 10:27:51.483 [INFO][3759] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.509724 env[1140]: 2024-02-09 10:27:51.483 [INFO][3759] dataplane_linux.go 68: Setting the host side veth name to cali715164ab93a ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.509724 env[1140]: 2024-02-09 10:27:51.487 [INFO][3759] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.509724 env[1140]: 2024-02-09 10:27:51.490 [INFO][3759] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmz4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7733a2d-55f9-40e4-9366-0a67823fa03e", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444", Pod:"csi-node-driver-kmz4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali715164ab93a", MAC:"2a:5a:cb:7e:21:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:51.509724 env[1140]: 2024-02-09 10:27:51.501 [INFO][3759] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444" Namespace="calico-system" Pod="csi-node-driver-kmz4b" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit: BPF prog-id=159 op=LOAD Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3814 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346330383063656437353631346339646233626130386438333030 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3814 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346330383063656437353631346339646233626130386438333030 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.526000 audit: BPF prog-id=160 op=LOAD Feb 9 10:27:51.526000 audit[3824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3814 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346330383063656437353631346339646233626130386438333030 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit: BPF prog-id=161 op=LOAD Feb 9 10:27:51.527000 audit[3824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3814 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346330383063656437353631346339646233626130386438333030 Feb 9 10:27:51.527000 audit: BPF prog-id=161 op=UNLOAD Feb 9 10:27:51.527000 audit: BPF prog-id=160 op=UNLOAD Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.527000 audit: BPF prog-id=162 op=LOAD Feb 9 10:27:51.527000 audit[3824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3814 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237346330383063656437353631346339646233626130386438333030 Feb 9 10:27:51.527000 audit[3857]: NETFILTER_CFG table=filter:121 family=2 entries=50 op=nft_register_chain pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:51.527000 audit[3857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25136 a0=3 a1=ffffc7dad590 a2=0 a3=ffff8eba7fa8 items=0 ppid=3261 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.527000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:51.530131 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:27:51.534539 env[1140]: time="2024-02-09T10:27:51.534467272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:51.534539 env[1140]: time="2024-02-09T10:27:51.534514794Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:51.534539 env[1140]: time="2024-02-09T10:27:51.534525234Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:51.534872 env[1140]: time="2024-02-09T10:27:51.534843527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444 pid=3866 runtime=io.containerd.runc.v2 Feb 9 10:27:51.555128 systemd[1]: Started cri-containerd-bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444.scope. Feb 9 10:27:51.558221 env[1140]: time="2024-02-09T10:27:51.558182829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5k7xd,Uid:852ad547-793e-4a28-982d-f137e769ded6,Namespace:kube-system,Attempt:1,} returns sandbox id \"b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c\"" Feb 9 10:27:51.559079 kubelet[2038]: E0209 10:27:51.558743 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:51.560643 env[1140]: time="2024-02-09T10:27:51.560593446Z" level=info msg="CreateContainer within sandbox \"b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.573000 audit: BPF prog-id=163 op=LOAD Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3866 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633031626239323535616665646632386339373464303035336438 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3866 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633031626239323535616665646632386339373464303035336438 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.574000 audit: BPF prog-id=164 op=LOAD Feb 9 10:27:51.574000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3866 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633031626239323535616665646632386339373464303035336438 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.575000 audit: BPF prog-id=165 op=LOAD Feb 9 10:27:51.575000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3866 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633031626239323535616665646632386339373464303035336438 Feb 9 10:27:51.576000 audit: BPF prog-id=165 op=UNLOAD Feb 9 10:27:51.576000 audit: BPF prog-id=164 op=UNLOAD Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.576000 audit: BPF prog-id=166 op=LOAD Feb 9 10:27:51.576000 audit[3876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3866 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633031626239323535616665646632386339373464303035336438 Feb 9 10:27:51.582319 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:27:51.585937 env[1140]: time="2024-02-09T10:27:51.585903708Z" level=info msg="CreateContainer within sandbox \"b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2175c3720ede833dfe2f8c350b94dbbef9e44f4f1b307aae4e3e150131505683\"" Feb 9 10:27:51.586642 env[1140]: time="2024-02-09T10:27:51.586613616Z" level=info msg="StartContainer for \"2175c3720ede833dfe2f8c350b94dbbef9e44f4f1b307aae4e3e150131505683\"" Feb 9 10:27:51.600124 env[1140]: time="2024-02-09T10:27:51.600090160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmz4b,Uid:e7733a2d-55f9-40e4-9366-0a67823fa03e,Namespace:calico-system,Attempt:1,} returns sandbox id \"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444\"" Feb 9 10:27:51.602077 env[1140]: time="2024-02-09T10:27:51.602052079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:27:51.607910 systemd[1]: Started cri-containerd-2175c3720ede833dfe2f8c350b94dbbef9e44f4f1b307aae4e3e150131505683.scope. Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.628000 audit: BPF prog-id=167 op=LOAD Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3814 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373563333732306564653833336466653266386333353062393464 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3814 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373563333732306564653833336466653266386333353062393464 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit: BPF prog-id=168 op=LOAD Feb 9 10:27:51.629000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3814 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373563333732306564653833336466653266386333353062393464 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit: BPF prog-id=169 op=LOAD Feb 9 10:27:51.629000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3814 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373563333732306564653833336466653266386333353062393464 Feb 9 10:27:51.629000 audit: BPF prog-id=169 op=UNLOAD Feb 9 10:27:51.629000 audit: BPF prog-id=168 op=UNLOAD Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:51.629000 audit: BPF prog-id=170 op=LOAD Feb 9 10:27:51.629000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3814 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:51.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373563333732306564653833336466653266386333353062393464 Feb 9 10:27:51.645646 env[1140]: time="2024-02-09T10:27:51.645599997Z" level=info msg="StartContainer for \"2175c3720ede833dfe2f8c350b94dbbef9e44f4f1b307aae4e3e150131505683\" returns successfully" Feb 9 10:27:52.236278 env[1140]: time="2024-02-09T10:27:52.236247039Z" level=info msg="StopPodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\"" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.275 [INFO][3963] k8s.go 578: Cleaning up netns ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.276 [INFO][3963] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" iface="eth0" netns="/var/run/netns/cni-ab1be853-8ebc-81e7-4f3b-ed16ed014c09" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.276 [INFO][3963] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" iface="eth0" netns="/var/run/netns/cni-ab1be853-8ebc-81e7-4f3b-ed16ed014c09" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.276 [INFO][3963] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" iface="eth0" netns="/var/run/netns/cni-ab1be853-8ebc-81e7-4f3b-ed16ed014c09" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.276 [INFO][3963] k8s.go 585: Releasing IP address(es) ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.276 [INFO][3963] utils.go 188: Calico CNI releasing IP address ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.293 [INFO][3971] ipam_plugin.go 415: Releasing address using handleID ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.293 [INFO][3971] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.293 [INFO][3971] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.302 [WARNING][3971] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.302 [INFO][3971] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.303 [INFO][3971] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:52.306306 env[1140]: 2024-02-09 10:27:52.305 [INFO][3963] k8s.go 591: Teardown processing complete. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:27:52.306801 env[1140]: time="2024-02-09T10:27:52.306428252Z" level=info msg="TearDown network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" successfully" Feb 9 10:27:52.306801 env[1140]: time="2024-02-09T10:27:52.306459653Z" level=info msg="StopPodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" returns successfully" Feb 9 10:27:52.307061 env[1140]: time="2024-02-09T10:27:52.307034916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54647fd667-wwwmb,Uid:67c8e069-7d42-4bda-915d-6e04f81cc4ad,Namespace:calico-system,Attempt:1,}" Feb 9 10:27:52.323051 systemd[1]: run-netns-cni\x2dab1be853\x2d8ebc\x2d81e7\x2d4f3b\x2ded16ed014c09.mount: Deactivated successfully. Feb 9 10:27:52.332406 kubelet[2038]: E0209 10:27:52.332344 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:52.352193 kubelet[2038]: I0209 10:27:52.352076 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-5k7xd" podStartSLOduration=29.352043095 pod.CreationTimestamp="2024-02-09 10:27:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:52.343092181 +0000 UTC m=+44.238347004" watchObservedRunningTime="2024-02-09 10:27:52.352043095 +0000 UTC m=+44.247297918" Feb 9 10:27:52.378000 audit[4017]: NETFILTER_CFG table=filter:122 family=2 entries=6 op=nft_register_rule pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:52.378000 audit[4017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff6a9bae0 a2=0 a3=ffff846616c0 items=0 ppid=2217 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:52.379000 audit[4017]: NETFILTER_CFG table=nat:123 family=2 entries=60 op=nft_register_rule pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:52.379000 audit[4017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=fffff6a9bae0 a2=0 a3=ffff846616c0 items=0 ppid=2217 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:52.428000 audit[4051]: NETFILTER_CFG table=filter:124 family=2 entries=6 op=nft_register_rule pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:52.428000 audit[4051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc334f870 a2=0 a3=ffff83c2f6c0 items=0 ppid=2217 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:52.438225 systemd-networkd[1040]: cali7c721521a1d: Link UP Feb 9 10:27:52.439299 systemd-networkd[1040]: cali7c721521a1d: Gained carrier Feb 9 10:27:52.439402 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c721521a1d: link becomes ready Feb 9 10:27:52.439000 audit[4051]: NETFILTER_CFG table=nat:125 family=2 entries=72 op=nft_register_chain pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:52.439000 audit[4051]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc334f870 a2=0 a3=ffff83c2f6c0 items=0 ppid=2217 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.371 [INFO][3979] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0 calico-kube-controllers-54647fd667- calico-system 67c8e069-7d42-4bda-915d-6e04f81cc4ad 761 0 2024-02-09 10:27:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:54647fd667 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-54647fd667-wwwmb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7c721521a1d [] []}} ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.371 [INFO][3979] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.396 [INFO][4018] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" HandleID="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.409 [INFO][4018] ipam_plugin.go 268: Auto assigning IP ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" HandleID="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004b7350), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-54647fd667-wwwmb", "timestamp":"2024-02-09 10:27:52.396675979 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.409 [INFO][4018] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.409 [INFO][4018] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.409 [INFO][4018] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.411 [INFO][4018] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.415 [INFO][4018] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.419 [INFO][4018] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.421 [INFO][4018] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.423 [INFO][4018] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.423 [INFO][4018] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.424 [INFO][4018] ipam.go 1682: Creating new handle: k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.427 [INFO][4018] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.432 [INFO][4018] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.432 [INFO][4018] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" host="localhost" Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.432 [INFO][4018] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:52.449979 env[1140]: 2024-02-09 10:27:52.432 [INFO][4018] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" HandleID="k8s-pod-network.c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.450559 env[1140]: 2024-02-09 10:27:52.433 [INFO][3979] k8s.go 385: Populated endpoint ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0", GenerateName:"calico-kube-controllers-54647fd667-", Namespace:"calico-system", SelfLink:"", UID:"67c8e069-7d42-4bda-915d-6e04f81cc4ad", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54647fd667", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-54647fd667-wwwmb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c721521a1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:52.450559 env[1140]: 2024-02-09 10:27:52.434 [INFO][3979] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.450559 env[1140]: 2024-02-09 10:27:52.434 [INFO][3979] dataplane_linux.go 68: Setting the host side veth name to cali7c721521a1d ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.450559 env[1140]: 2024-02-09 10:27:52.439 [INFO][3979] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.450559 env[1140]: 2024-02-09 10:27:52.440 [INFO][3979] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0", GenerateName:"calico-kube-controllers-54647fd667-", Namespace:"calico-system", SelfLink:"", UID:"67c8e069-7d42-4bda-915d-6e04f81cc4ad", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54647fd667", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f", Pod:"calico-kube-controllers-54647fd667-wwwmb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c721521a1d", MAC:"3a:79:88:ff:d3:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:52.450559 env[1140]: 2024-02-09 10:27:52.448 [INFO][3979] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f" Namespace="calico-system" Pod="calico-kube-controllers-54647fd667-wwwmb" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:27:52.462000 audit[4069]: NETFILTER_CFG table=filter:126 family=2 entries=38 op=nft_register_chain pid=4069 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:52.462000 audit[4069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19528 a0=3 a1=ffffda6b3d80 a2=0 a3=ffff8d1cffa8 items=0 ppid=3261 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.462000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:52.466075 env[1140]: time="2024-02-09T10:27:52.466017079Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:52.466075 env[1140]: time="2024-02-09T10:27:52.466059001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:52.466075 env[1140]: time="2024-02-09T10:27:52.466070041Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:52.466366 env[1140]: time="2024-02-09T10:27:52.466314251Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f pid=4077 runtime=io.containerd.runc.v2 Feb 9 10:27:52.483430 systemd[1]: Started cri-containerd-c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f.scope. Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.502000 audit: BPF prog-id=171 op=LOAD Feb 9 10:27:52.503000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.503000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335636132666162626130393538386563373939633033316138343838 Feb 9 10:27:52.503000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.503000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335636132666162626130393538386563373939633033316138343838 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.504000 audit: BPF prog-id=172 op=LOAD Feb 9 10:27:52.504000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335636132666162626130393538386563373939633033316138343838 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.505000 audit: BPF prog-id=173 op=LOAD Feb 9 10:27:52.505000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335636132666162626130393538386563373939633033316138343838 Feb 9 10:27:52.506000 audit: BPF prog-id=173 op=UNLOAD Feb 9 10:27:52.506000 audit: BPF prog-id=172 op=UNLOAD Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:52.506000 audit: BPF prog-id=174 op=LOAD Feb 9 10:27:52.506000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4077 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335636132666162626130393538386563373939633033316138343838 Feb 9 10:27:52.509596 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:27:52.526140 env[1140]: time="2024-02-09T10:27:52.526100534Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54647fd667-wwwmb,Uid:67c8e069-7d42-4bda-915d-6e04f81cc4ad,Namespace:calico-system,Attempt:1,} returns sandbox id \"c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f\"" Feb 9 10:27:53.021325 env[1140]: time="2024-02-09T10:27:53.021283967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:53.022784 env[1140]: time="2024-02-09T10:27:53.022751264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:53.024380 env[1140]: time="2024-02-09T10:27:53.024356206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:53.025610 env[1140]: time="2024-02-09T10:27:53.025582734Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:53.025976 env[1140]: time="2024-02-09T10:27:53.025948268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 10:27:53.026876 env[1140]: time="2024-02-09T10:27:53.026848183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 10:27:53.028804 env[1140]: time="2024-02-09T10:27:53.028772497Z" level=info msg="CreateContainer within sandbox \"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:27:53.040497 env[1140]: time="2024-02-09T10:27:53.040463830Z" level=info msg="CreateContainer within sandbox \"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e52c99ae84070d145848b3de77b81927b996af72a87b1394bd39ca31805c9dc2\"" Feb 9 10:27:53.040957 env[1140]: time="2024-02-09T10:27:53.040932208Z" level=info msg="StartContainer for \"e52c99ae84070d145848b3de77b81927b996af72a87b1394bd39ca31805c9dc2\"" Feb 9 10:27:53.068747 systemd[1]: Started cri-containerd-e52c99ae84070d145848b3de77b81927b996af72a87b1394bd39ca31805c9dc2.scope. Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3866 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:53.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326339396165383430373064313435383438623364653737623831 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit: BPF prog-id=175 op=LOAD Feb 9 10:27:53.083000 audit[4118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3866 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:53.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326339396165383430373064313435383438623364653737623831 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit: BPF prog-id=176 op=LOAD Feb 9 10:27:53.083000 audit[4118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3866 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:53.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326339396165383430373064313435383438623364653737623831 Feb 9 10:27:53.083000 audit: BPF prog-id=176 op=UNLOAD Feb 9 10:27:53.083000 audit: BPF prog-id=175 op=UNLOAD Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:53.083000 audit: BPF prog-id=177 op=LOAD Feb 9 10:27:53.083000 audit[4118]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3866 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:53.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535326339396165383430373064313435383438623364653737623831 Feb 9 10:27:53.117334 env[1140]: time="2024-02-09T10:27:53.117274125Z" level=info msg="StartContainer for \"e52c99ae84070d145848b3de77b81927b996af72a87b1394bd39ca31805c9dc2\" returns successfully" Feb 9 10:27:53.220473 systemd-networkd[1040]: cali715164ab93a: Gained IPv6LL Feb 9 10:27:53.322012 systemd[1]: run-containerd-runc-k8s.io-c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f-runc.HgVmqG.mount: Deactivated successfully. Feb 9 10:27:53.346134 kubelet[2038]: E0209 10:27:53.346113 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:53.412482 systemd-networkd[1040]: calieb2e1779ec2: Gained IPv6LL Feb 9 10:27:54.120231 systemd-networkd[1040]: cali7c721521a1d: Gained IPv6LL Feb 9 10:27:54.347887 kubelet[2038]: E0209 10:27:54.347863 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:54.516913 systemd[1]: Started sshd@8-10.0.0.3:22-10.0.0.1:43182.service. Feb 9 10:27:54.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.3:22-10.0.0.1:43182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:54.517719 kernel: kauditd_printk_skb: 422 callbacks suppressed Feb 9 10:27:54.517774 kernel: audit: type=1130 audit(1707474474.515:1312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.3:22-10.0.0.1:43182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:54.560000 audit[4148]: USER_ACCT pid=4148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.561766 sshd[4148]: Accepted publickey for core from 10.0.0.1 port 43182 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:54.564904 sshd[4148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:54.563000 audit[4148]: CRED_ACQ pid=4148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.571464 kernel: audit: type=1101 audit(1707474474.560:1313): pid=4148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.571534 kernel: audit: type=1103 audit(1707474474.563:1314): pid=4148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.571558 kernel: audit: type=1006 audit(1707474474.563:1315): pid=4148 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 10:27:54.574952 kernel: audit: type=1300 audit(1707474474.563:1315): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc49d440 a2=3 a3=1 items=0 ppid=1 pid=4148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:54.563000 audit[4148]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc49d440 a2=3 a3=1 items=0 ppid=1 pid=4148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:54.576611 systemd[1]: Started session-9.scope. Feb 9 10:27:54.576917 systemd-logind[1124]: New session 9 of user core. Feb 9 10:27:54.577400 kernel: audit: type=1327 audit(1707474474.563:1315): proctitle=737368643A20636F7265205B707269765D Feb 9 10:27:54.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:27:54.579000 audit[4148]: USER_START pid=4148 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.580000 audit[4150]: CRED_ACQ pid=4150 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.585465 kernel: audit: type=1105 audit(1707474474.579:1316): pid=4148 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.585599 kernel: audit: type=1103 audit(1707474474.580:1317): pid=4150 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.709967 sshd[4148]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:54.709000 audit[4148]: USER_END pid=4148 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.712230 systemd-logind[1124]: Session 9 logged out. Waiting for processes to exit. Feb 9 10:27:54.712827 systemd[1]: sshd@8-10.0.0.3:22-10.0.0.1:43182.service: Deactivated successfully. Feb 9 10:27:54.709000 audit[4148]: CRED_DISP pid=4148 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.713558 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 10:27:54.714670 systemd-logind[1124]: Removed session 9. Feb 9 10:27:54.715535 kernel: audit: type=1106 audit(1707474474.709:1318): pid=4148 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.715585 kernel: audit: type=1104 audit(1707474474.709:1319): pid=4148 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:54.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.3:22-10.0.0.1:43182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.209432 env[1140]: time="2024-02-09T10:27:55.209389243Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:55.210850 env[1140]: time="2024-02-09T10:27:55.210816216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:55.212565 env[1140]: time="2024-02-09T10:27:55.212538401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:55.213798 env[1140]: time="2024-02-09T10:27:55.213773207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:55.214425 env[1140]: time="2024-02-09T10:27:55.214399670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 10:27:55.215621 env[1140]: time="2024-02-09T10:27:55.215524912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:27:55.226185 env[1140]: time="2024-02-09T10:27:55.226154508Z" level=info msg="CreateContainer within sandbox \"c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 10:27:55.241273 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3724916031.mount: Deactivated successfully. Feb 9 10:27:55.244363 env[1140]: time="2024-02-09T10:27:55.244307266Z" level=info msg="CreateContainer within sandbox \"c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f6a5b676a53b15c9df2d8d59df311ae22856a8ca5c9eedd5a08872301c61a72e\"" Feb 9 10:27:55.246310 env[1140]: time="2024-02-09T10:27:55.246275139Z" level=info msg="StartContainer for \"f6a5b676a53b15c9df2d8d59df311ae22856a8ca5c9eedd5a08872301c61a72e\"" Feb 9 10:27:55.260638 systemd[1]: Started cri-containerd-f6a5b676a53b15c9df2d8d59df311ae22856a8ca5c9eedd5a08872301c61a72e.scope. Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.298000 audit: BPF prog-id=178 op=LOAD Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4077 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:55.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613562363736613533623135633964663264386435396466333131 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4077 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:55.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613562363736613533623135633964663264386435396466333131 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit: BPF prog-id=179 op=LOAD Feb 9 10:27:55.299000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4077 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:55.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613562363736613533623135633964663264386435396466333131 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit: BPF prog-id=180 op=LOAD Feb 9 10:27:55.299000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4077 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:55.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613562363736613533623135633964663264386435396466333131 Feb 9 10:27:55.299000 audit: BPF prog-id=180 op=UNLOAD Feb 9 10:27:55.299000 audit: BPF prog-id=179 op=UNLOAD Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { perfmon } for pid=4179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit[4179]: AVC avc: denied { bpf } for pid=4179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:55.299000 audit: BPF prog-id=181 op=LOAD Feb 9 10:27:55.299000 audit[4179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4077 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:55.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613562363736613533623135633964663264386435396466333131 Feb 9 10:27:55.392782 env[1140]: time="2024-02-09T10:27:55.392368349Z" level=info msg="StartContainer for \"f6a5b676a53b15c9df2d8d59df311ae22856a8ca5c9eedd5a08872301c61a72e\" returns successfully" Feb 9 10:27:56.407162 kubelet[2038]: I0209 10:27:56.407110 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-54647fd667-wwwmb" podStartSLOduration=-9.223372008447702e+09 pod.CreationTimestamp="2024-02-09 10:27:28 +0000 UTC" firstStartedPulling="2024-02-09 10:27:52.527366344 +0000 UTC m=+44.422621127" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:56.406600963 +0000 UTC m=+48.301855786" watchObservedRunningTime="2024-02-09 10:27:56.40707354 +0000 UTC m=+48.302328363" Feb 9 10:27:56.757749 env[1140]: time="2024-02-09T10:27:56.757633870Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:56.759003 env[1140]: time="2024-02-09T10:27:56.758968239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:56.760799 env[1140]: time="2024-02-09T10:27:56.760762305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:56.762565 env[1140]: time="2024-02-09T10:27:56.762524090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:56.763032 env[1140]: time="2024-02-09T10:27:56.762993187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:27:56.765022 env[1140]: time="2024-02-09T10:27:56.764989660Z" level=info msg="CreateContainer within sandbox \"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:27:56.778522 env[1140]: time="2024-02-09T10:27:56.778476314Z" level=info msg="CreateContainer within sandbox \"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"57824d9ba2893f471c23ce3eb800060798625bfd57a7a7697956f6329ba65dfb\"" Feb 9 10:27:56.778927 env[1140]: time="2024-02-09T10:27:56.778893610Z" level=info msg="StartContainer for \"57824d9ba2893f471c23ce3eb800060798625bfd57a7a7697956f6329ba65dfb\"" Feb 9 10:27:56.796461 systemd[1]: Started cri-containerd-57824d9ba2893f471c23ce3eb800060798625bfd57a7a7697956f6329ba65dfb.scope. Feb 9 10:27:56.829000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.829000 audit[4215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3866 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:56.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383234643962613238393366343731633233636533656238303030 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit: BPF prog-id=182 op=LOAD Feb 9 10:27:56.830000 audit[4215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3866 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:56.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383234643962613238393366343731633233636533656238303030 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit: BPF prog-id=183 op=LOAD Feb 9 10:27:56.830000 audit[4215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3866 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:56.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383234643962613238393366343731633233636533656238303030 Feb 9 10:27:56.830000 audit: BPF prog-id=183 op=UNLOAD Feb 9 10:27:56.830000 audit: BPF prog-id=182 op=UNLOAD Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:56.830000 audit: BPF prog-id=184 op=LOAD Feb 9 10:27:56.830000 audit[4215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3866 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:56.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537383234643962613238393366343731633233636533656238303030 Feb 9 10:27:56.844341 env[1140]: time="2024-02-09T10:27:56.844295127Z" level=info msg="StartContainer for \"57824d9ba2893f471c23ce3eb800060798625bfd57a7a7697956f6329ba65dfb\" returns successfully" Feb 9 10:27:57.286336 kubelet[2038]: I0209 10:27:57.286218 2038 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:27:57.286336 kubelet[2038]: I0209 10:27:57.286252 2038 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:27:57.402030 kubelet[2038]: I0209 10:27:57.401983 2038 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:27:57.411957 kubelet[2038]: I0209 10:27:57.411924 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-kmz4b" podStartSLOduration=-9.223372007442884e+09 pod.CreationTimestamp="2024-02-09 10:27:28 +0000 UTC" firstStartedPulling="2024-02-09 10:27:51.601541339 +0000 UTC m=+43.496796162" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:57.410863646 +0000 UTC m=+49.306118509" watchObservedRunningTime="2024-02-09 10:27:57.411890923 +0000 UTC m=+49.307145746" Feb 9 10:27:59.551149 systemd[1]: run-containerd-runc-k8s.io-c4cf466bcf7dc13909ed0aa533469f27249da807a10fdeddb2c53bae0f8df8d9-runc.SSCG0X.mount: Deactivated successfully. Feb 9 10:27:59.618270 kubelet[2038]: E0209 10:27:59.615596 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:27:59.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.3:22-10.0.0.1:43198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:59.713810 systemd[1]: Started sshd@9-10.0.0.3:22-10.0.0.1:43198.service. Feb 9 10:27:59.714605 kernel: kauditd_printk_skb: 101 callbacks suppressed Feb 9 10:27:59.714645 kernel: audit: type=1130 audit(1707474479.713:1345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.3:22-10.0.0.1:43198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:59.755000 audit[4274]: USER_ACCT pid=4274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.756609 sshd[4274]: Accepted publickey for core from 10.0.0.1 port 43198 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:27:59.758061 sshd[4274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:27:59.757000 audit[4274]: CRED_ACQ pid=4274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.760377 kernel: audit: type=1101 audit(1707474479.755:1346): pid=4274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.760442 kernel: audit: type=1103 audit(1707474479.757:1347): pid=4274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.760463 kernel: audit: type=1006 audit(1707474479.757:1348): pid=4274 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 10:27:59.757000 audit[4274]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa16b890 a2=3 a3=1 items=0 ppid=1 pid=4274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.761730 systemd-logind[1124]: New session 10 of user core. Feb 9 10:27:59.762560 systemd[1]: Started session-10.scope. Feb 9 10:27:59.764030 kernel: audit: type=1300 audit(1707474479.757:1348): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa16b890 a2=3 a3=1 items=0 ppid=1 pid=4274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:59.764083 kernel: audit: type=1327 audit(1707474479.757:1348): proctitle=737368643A20636F7265205B707269765D Feb 9 10:27:59.757000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:27:59.765000 audit[4274]: USER_START pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.766000 audit[4276]: CRED_ACQ pid=4276 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.770620 kernel: audit: type=1105 audit(1707474479.765:1349): pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.770664 kernel: audit: type=1103 audit(1707474479.766:1350): pid=4276 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.880399 sshd[4274]: pam_unix(sshd:session): session closed for user core Feb 9 10:27:59.881000 audit[4274]: USER_END pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.883537 systemd[1]: sshd@9-10.0.0.3:22-10.0.0.1:43198.service: Deactivated successfully. Feb 9 10:27:59.884282 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 10:27:59.881000 audit[4274]: CRED_DISP pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.884875 systemd-logind[1124]: Session 10 logged out. Waiting for processes to exit. Feb 9 10:27:59.885594 systemd-logind[1124]: Removed session 10. Feb 9 10:27:59.886587 kernel: audit: type=1106 audit(1707474479.881:1351): pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.886631 kernel: audit: type=1104 audit(1707474479.881:1352): pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:27:59.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.3:22-10.0.0.1:43198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:03.372607 kubelet[2038]: I0209 10:28:03.372559 2038 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:28:04.885134 systemd[1]: Started sshd@10-10.0.0.3:22-10.0.0.1:59422.service. Feb 9 10:28:04.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.3:22-10.0.0.1:59422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:04.885889 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:28:04.885948 kernel: audit: type=1130 audit(1707474484.884:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.3:22-10.0.0.1:59422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:04.918000 audit[4340]: USER_ACCT pid=4340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.918917 sshd[4340]: Accepted publickey for core from 10.0.0.1 port 59422 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:04.920485 sshd[4340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:04.919000 audit[4340]: CRED_ACQ pid=4340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.923388 kernel: audit: type=1101 audit(1707474484.918:1355): pid=4340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.923460 kernel: audit: type=1103 audit(1707474484.919:1356): pid=4340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.923487 kernel: audit: type=1006 audit(1707474484.919:1357): pid=4340 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 10:28:04.923550 systemd-logind[1124]: New session 11 of user core. Feb 9 10:28:04.924312 systemd[1]: Started session-11.scope. Feb 9 10:28:04.919000 audit[4340]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc44e1f0 a2=3 a3=1 items=0 ppid=1 pid=4340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:04.927700 kernel: audit: type=1300 audit(1707474484.919:1357): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc44e1f0 a2=3 a3=1 items=0 ppid=1 pid=4340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:04.927876 kernel: audit: type=1327 audit(1707474484.919:1357): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:04.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:04.927000 audit[4340]: USER_START pid=4340 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.930546 kernel: audit: type=1105 audit(1707474484.927:1358): pid=4340 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.930601 kernel: audit: type=1103 audit(1707474484.928:1359): pid=4342 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:04.928000 audit[4342]: CRED_ACQ pid=4342 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.030147 sshd[4340]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:05.030000 audit[4340]: USER_END pid=4340 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.032530 systemd[1]: sshd@10-10.0.0.3:22-10.0.0.1:59422.service: Deactivated successfully. Feb 9 10:28:05.033150 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 10:28:05.030000 audit[4340]: CRED_DISP pid=4340 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.033710 systemd-logind[1124]: Session 11 logged out. Waiting for processes to exit. Feb 9 10:28:05.034821 systemd[1]: Started sshd@11-10.0.0.3:22-10.0.0.1:59424.service. Feb 9 10:28:05.035526 systemd-logind[1124]: Removed session 11. Feb 9 10:28:05.035784 kernel: audit: type=1106 audit(1707474485.030:1360): pid=4340 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.035816 kernel: audit: type=1104 audit(1707474485.030:1361): pid=4340 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.3:22-10.0.0.1:59422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:05.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.3:22-10.0.0.1:59424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:05.066000 audit[4354]: USER_ACCT pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.067619 sshd[4354]: Accepted publickey for core from 10.0.0.1 port 59424 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:05.066000 audit[4354]: CRED_ACQ pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.066000 audit[4354]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0959860 a2=3 a3=1 items=0 ppid=1 pid=4354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:05.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:05.068788 sshd[4354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:05.071965 systemd-logind[1124]: New session 12 of user core. Feb 9 10:28:05.072826 systemd[1]: Started session-12.scope. Feb 9 10:28:05.074000 audit[4354]: USER_START pid=4354 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.076000 audit[4356]: CRED_ACQ pid=4356 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:05.194000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:05.194000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:05.194000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4010333e60 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:28:05.194000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4002aaa860 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:28:05.194000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:28:05.194000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:28:05.194000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6489 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:05.194000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4010ebc660 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:28:05.194000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:28:05.196000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:05.196000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4002aaa880 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:28:05.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:28:05.196000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:05.196000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4010333fb0 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:28:05.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:28:05.203000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6495 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:05.203000 audit[1933]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4010ebc690 a2=fc6 a3=0 items=0 ppid=1763 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c822 key=(null) Feb 9 10:28:05.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 9 10:28:06.073220 systemd[1]: Started sshd@12-10.0.0.3:22-10.0.0.1:59438.service. Feb 9 10:28:06.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.3:22-10.0.0.1:59438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:06.079736 sshd[4354]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:06.080000 audit[4354]: USER_END pid=4354 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.080000 audit[4354]: CRED_DISP pid=4354 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.083691 systemd[1]: sshd@11-10.0.0.3:22-10.0.0.1:59424.service: Deactivated successfully. Feb 9 10:28:06.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.3:22-10.0.0.1:59424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:06.084538 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 10:28:06.085116 systemd-logind[1124]: Session 12 logged out. Waiting for processes to exit. Feb 9 10:28:06.086312 systemd-logind[1124]: Removed session 12. Feb 9 10:28:06.109000 audit[4366]: USER_ACCT pid=4366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.110882 sshd[4366]: Accepted publickey for core from 10.0.0.1 port 59438 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:06.110000 audit[4366]: CRED_ACQ pid=4366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.110000 audit[4366]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6514b20 a2=3 a3=1 items=0 ppid=1 pid=4366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:06.110000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:06.111996 sshd[4366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:06.115024 systemd-logind[1124]: New session 13 of user core. Feb 9 10:28:06.115902 systemd[1]: Started session-13.scope. Feb 9 10:28:06.117000 audit[4366]: USER_START pid=4366 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.118000 audit[4369]: CRED_ACQ pid=4369 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.231609 sshd[4366]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:06.231000 audit[4366]: USER_END pid=4366 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.231000 audit[4366]: CRED_DISP pid=4366 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:06.233956 systemd-logind[1124]: Session 13 logged out. Waiting for processes to exit. Feb 9 10:28:06.234176 systemd[1]: sshd@12-10.0.0.3:22-10.0.0.1:59438.service: Deactivated successfully. Feb 9 10:28:06.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.3:22-10.0.0.1:59438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:06.234915 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 10:28:06.235608 systemd-logind[1124]: Removed session 13. Feb 9 10:28:06.292000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:06.292000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002f2a740 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:28:06.292000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:06.300000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:06.300000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002da8b70 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:28:06.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:08.185536 env[1140]: time="2024-02-09T10:28:08.185488165Z" level=info msg="StopPodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\"" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.220 [WARNING][4394] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0", GenerateName:"calico-kube-controllers-54647fd667-", Namespace:"calico-system", SelfLink:"", UID:"67c8e069-7d42-4bda-915d-6e04f81cc4ad", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54647fd667", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f", Pod:"calico-kube-controllers-54647fd667-wwwmb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c721521a1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.220 [INFO][4394] k8s.go 578: Cleaning up netns ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.220 [INFO][4394] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" iface="eth0" netns="" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.220 [INFO][4394] k8s.go 585: Releasing IP address(es) ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.220 [INFO][4394] utils.go 188: Calico CNI releasing IP address ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.243 [INFO][4402] ipam_plugin.go 415: Releasing address using handleID ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.243 [INFO][4402] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.243 [INFO][4402] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.252 [WARNING][4402] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.252 [INFO][4402] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.253 [INFO][4402] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.257130 env[1140]: 2024-02-09 10:28:08.255 [INFO][4394] k8s.go 591: Teardown processing complete. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.257680 env[1140]: time="2024-02-09T10:28:08.257153497Z" level=info msg="TearDown network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" successfully" Feb 9 10:28:08.257680 env[1140]: time="2024-02-09T10:28:08.257197978Z" level=info msg="StopPodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" returns successfully" Feb 9 10:28:08.258042 env[1140]: time="2024-02-09T10:28:08.258011444Z" level=info msg="RemovePodSandbox for \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\"" Feb 9 10:28:08.258163 env[1140]: time="2024-02-09T10:28:08.258124887Z" level=info msg="Forcibly stopping sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\"" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.294 [WARNING][4426] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0", GenerateName:"calico-kube-controllers-54647fd667-", Namespace:"calico-system", SelfLink:"", UID:"67c8e069-7d42-4bda-915d-6e04f81cc4ad", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54647fd667", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5ca2fabba09588ec799c031a84887b407b1bd0f9d21b99dcace08316bf4912f", Pod:"calico-kube-controllers-54647fd667-wwwmb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c721521a1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.294 [INFO][4426] k8s.go 578: Cleaning up netns ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.294 [INFO][4426] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" iface="eth0" netns="" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.294 [INFO][4426] k8s.go 585: Releasing IP address(es) ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.294 [INFO][4426] utils.go 188: Calico CNI releasing IP address ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.312 [INFO][4433] ipam_plugin.go 415: Releasing address using handleID ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.312 [INFO][4433] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.312 [INFO][4433] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.321 [WARNING][4433] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.321 [INFO][4433] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" HandleID="k8s-pod-network.b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Workload="localhost-k8s-calico--kube--controllers--54647fd667--wwwmb-eth0" Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.323 [INFO][4433] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.326251 env[1140]: 2024-02-09 10:28:08.325 [INFO][4426] k8s.go 591: Teardown processing complete. ContainerID="b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350" Feb 9 10:28:08.326832 env[1140]: time="2024-02-09T10:28:08.326789364Z" level=info msg="TearDown network for sandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" successfully" Feb 9 10:28:08.329772 env[1140]: time="2024-02-09T10:28:08.329738337Z" level=info msg="RemovePodSandbox \"b7d1e74407cbb8de4e1377f62ae498dc9fc9530b5ff2b5cb3fc4d7c413190350\" returns successfully" Feb 9 10:28:08.330400 env[1140]: time="2024-02-09T10:28:08.330378397Z" level=info msg="StopPodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\"" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.364 [WARNING][4456] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--5k7xd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"852ad547-793e-4a28-982d-f137e769ded6", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c", Pod:"coredns-787d4945fb-5k7xd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb2e1779ec2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.364 [INFO][4456] k8s.go 578: Cleaning up netns ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.364 [INFO][4456] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" iface="eth0" netns="" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.364 [INFO][4456] k8s.go 585: Releasing IP address(es) ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.365 [INFO][4456] utils.go 188: Calico CNI releasing IP address ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.388 [INFO][4464] ipam_plugin.go 415: Releasing address using handleID ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.388 [INFO][4464] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.388 [INFO][4464] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.398 [WARNING][4464] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.398 [INFO][4464] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.399 [INFO][4464] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.402444 env[1140]: 2024-02-09 10:28:08.401 [INFO][4456] k8s.go 591: Teardown processing complete. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.402896 env[1140]: time="2024-02-09T10:28:08.402476542Z" level=info msg="TearDown network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" successfully" Feb 9 10:28:08.402896 env[1140]: time="2024-02-09T10:28:08.402505463Z" level=info msg="StopPodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" returns successfully" Feb 9 10:28:08.403189 env[1140]: time="2024-02-09T10:28:08.403154843Z" level=info msg="RemovePodSandbox for \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\"" Feb 9 10:28:08.403309 env[1140]: time="2024-02-09T10:28:08.403271247Z" level=info msg="Forcibly stopping sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\"" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.438 [WARNING][4490] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--5k7xd-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"852ad547-793e-4a28-982d-f137e769ded6", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b74c080ced75614c9db3ba08d83007cd9fd7ba81db64188ca76551c2e957e35c", Pod:"coredns-787d4945fb-5k7xd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb2e1779ec2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.439 [INFO][4490] k8s.go 578: Cleaning up netns ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.439 [INFO][4490] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" iface="eth0" netns="" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.439 [INFO][4490] k8s.go 585: Releasing IP address(es) ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.439 [INFO][4490] utils.go 188: Calico CNI releasing IP address ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.458 [INFO][4498] ipam_plugin.go 415: Releasing address using handleID ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.458 [INFO][4498] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.458 [INFO][4498] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.467 [WARNING][4498] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.467 [INFO][4498] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" HandleID="k8s-pod-network.7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Workload="localhost-k8s-coredns--787d4945fb--5k7xd-eth0" Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.471 [INFO][4498] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.474104 env[1140]: 2024-02-09 10:28:08.472 [INFO][4490] k8s.go 591: Teardown processing complete. ContainerID="7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52" Feb 9 10:28:08.474104 env[1140]: time="2024-02-09T10:28:08.474073671Z" level=info msg="TearDown network for sandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" successfully" Feb 9 10:28:08.477757 env[1140]: time="2024-02-09T10:28:08.477717385Z" level=info msg="RemovePodSandbox \"7eb12acfecaad4793eaa89629dfbb5e0cd85e43e22da39c3ee5da7be12d39b52\" returns successfully" Feb 9 10:28:08.478277 env[1140]: time="2024-02-09T10:28:08.478246202Z" level=info msg="StopPodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\"" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.514 [WARNING][4537] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmz4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7733a2d-55f9-40e4-9366-0a67823fa03e", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444", Pod:"csi-node-driver-kmz4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali715164ab93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.515 [INFO][4537] k8s.go 578: Cleaning up netns ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.515 [INFO][4537] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" iface="eth0" netns="" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.515 [INFO][4537] k8s.go 585: Releasing IP address(es) ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.515 [INFO][4537] utils.go 188: Calico CNI releasing IP address ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.531 [INFO][4549] ipam_plugin.go 415: Releasing address using handleID ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.531 [INFO][4549] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.531 [INFO][4549] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.540 [WARNING][4549] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.540 [INFO][4549] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.541 [INFO][4549] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.545146 env[1140]: 2024-02-09 10:28:08.543 [INFO][4537] k8s.go 591: Teardown processing complete. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.545583 env[1140]: time="2024-02-09T10:28:08.545162704Z" level=info msg="TearDown network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" successfully" Feb 9 10:28:08.545583 env[1140]: time="2024-02-09T10:28:08.545192625Z" level=info msg="StopPodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" returns successfully" Feb 9 10:28:08.545721 env[1140]: time="2024-02-09T10:28:08.545682760Z" level=info msg="RemovePodSandbox for \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\"" Feb 9 10:28:08.545757 env[1140]: time="2024-02-09T10:28:08.545722601Z" level=info msg="Forcibly stopping sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\"" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.577 [WARNING][4572] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmz4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7733a2d-55f9-40e4-9366-0a67823fa03e", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bac01bb9255afedf28c974d0053d8a7bfeb2795069b9c6ec33767a159fadd444", Pod:"csi-node-driver-kmz4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali715164ab93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.577 [INFO][4572] k8s.go 578: Cleaning up netns ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.577 [INFO][4572] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" iface="eth0" netns="" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.577 [INFO][4572] k8s.go 585: Releasing IP address(es) ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.577 [INFO][4572] utils.go 188: Calico CNI releasing IP address ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.593 [INFO][4580] ipam_plugin.go 415: Releasing address using handleID ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.593 [INFO][4580] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.593 [INFO][4580] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.602 [WARNING][4580] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.603 [INFO][4580] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" HandleID="k8s-pod-network.1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Workload="localhost-k8s-csi--node--driver--kmz4b-eth0" Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.604 [INFO][4580] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.607930 env[1140]: 2024-02-09 10:28:08.606 [INFO][4572] k8s.go 591: Teardown processing complete. ContainerID="1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3" Feb 9 10:28:08.608403 env[1140]: time="2024-02-09T10:28:08.607948516Z" level=info msg="TearDown network for sandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" successfully" Feb 9 10:28:08.610593 env[1140]: time="2024-02-09T10:28:08.610559598Z" level=info msg="RemovePodSandbox \"1fecda2c4d0a18e47ee6fc3e63aa0881d4798ec9fe0b3f698802dbff8d523fd3\" returns successfully" Feb 9 10:28:08.611075 env[1140]: time="2024-02-09T10:28:08.611040333Z" level=info msg="StopPodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\"" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.642 [WARNING][4603] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--85s2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581", Pod:"coredns-787d4945fb-85s2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7556573141f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.642 [INFO][4603] k8s.go 578: Cleaning up netns ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.642 [INFO][4603] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" iface="eth0" netns="" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.642 [INFO][4603] k8s.go 585: Releasing IP address(es) ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.642 [INFO][4603] utils.go 188: Calico CNI releasing IP address ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.658 [INFO][4610] ipam_plugin.go 415: Releasing address using handleID ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.659 [INFO][4610] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.659 [INFO][4610] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.667 [WARNING][4610] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.667 [INFO][4610] ipam_plugin.go 443: Releasing address using workloadID ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.668 [INFO][4610] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.672815 env[1140]: 2024-02-09 10:28:08.671 [INFO][4603] k8s.go 591: Teardown processing complete. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.673250 env[1140]: time="2024-02-09T10:28:08.672841915Z" level=info msg="TearDown network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" successfully" Feb 9 10:28:08.673250 env[1140]: time="2024-02-09T10:28:08.672870875Z" level=info msg="StopPodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" returns successfully" Feb 9 10:28:08.673388 env[1140]: time="2024-02-09T10:28:08.673342690Z" level=info msg="RemovePodSandbox for \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\"" Feb 9 10:28:08.673430 env[1140]: time="2024-02-09T10:28:08.673398732Z" level=info msg="Forcibly stopping sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\"" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.708 [WARNING][4633] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--85s2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d29bc2dd-0ddc-4f4c-8687-28b21c3fb8c5", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"10c483de682cf1c6c15d9e2bf24c443e6d9e2ea051cc5c6ef6f01c0a10d43581", Pod:"coredns-787d4945fb-85s2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7556573141f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.708 [INFO][4633] k8s.go 578: Cleaning up netns ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.708 [INFO][4633] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" iface="eth0" netns="" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.708 [INFO][4633] k8s.go 585: Releasing IP address(es) ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.708 [INFO][4633] utils.go 188: Calico CNI releasing IP address ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.725 [INFO][4641] ipam_plugin.go 415: Releasing address using handleID ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.725 [INFO][4641] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.726 [INFO][4641] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.736 [WARNING][4641] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.736 [INFO][4641] ipam_plugin.go 443: Releasing address using workloadID ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" HandleID="k8s-pod-network.682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Workload="localhost-k8s-coredns--787d4945fb--85s2t-eth0" Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.738 [INFO][4641] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:08.743219 env[1140]: 2024-02-09 10:28:08.739 [INFO][4633] k8s.go 591: Teardown processing complete. ContainerID="682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776" Feb 9 10:28:08.743219 env[1140]: time="2024-02-09T10:28:08.741496031Z" level=info msg="TearDown network for sandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" successfully" Feb 9 10:28:08.743970 env[1140]: time="2024-02-09T10:28:08.743923107Z" level=info msg="RemovePodSandbox \"682e0a5f1f2b2f753b2b0f45a5ceb8a5afbb9fdc5f5259b62ca1c6633aaeb776\" returns successfully" Feb 9 10:28:11.236693 systemd[1]: Started sshd@13-10.0.0.3:22-10.0.0.1:59454.service. Feb 9 10:28:11.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.3:22-10.0.0.1:59454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:11.237503 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 10:28:11.237556 kernel: audit: type=1130 audit(1707474491.235:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.3:22-10.0.0.1:59454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:11.270000 audit[4654]: USER_ACCT pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.272559 sshd[4654]: Accepted publickey for core from 10.0.0.1 port 59454 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:11.273975 sshd[4654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:11.271000 audit[4654]: CRED_ACQ pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.276310 kernel: audit: type=1101 audit(1707474491.270:1390): pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.276380 kernel: audit: type=1103 audit(1707474491.271:1391): pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.276406 kernel: audit: type=1006 audit(1707474491.271:1392): pid=4654 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 10:28:11.271000 audit[4654]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc172ee0 a2=3 a3=1 items=0 ppid=1 pid=4654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:11.278213 systemd-logind[1124]: New session 14 of user core. Feb 9 10:28:11.279028 systemd[1]: Started session-14.scope. Feb 9 10:28:11.279904 kernel: audit: type=1300 audit(1707474491.271:1392): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc172ee0 a2=3 a3=1 items=0 ppid=1 pid=4654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:11.279961 kernel: audit: type=1327 audit(1707474491.271:1392): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:11.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:11.281000 audit[4654]: USER_START pid=4654 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.281000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.287103 kernel: audit: type=1105 audit(1707474491.281:1393): pid=4654 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.287133 kernel: audit: type=1103 audit(1707474491.281:1394): pid=4656 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.386873 sshd[4654]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:11.386000 audit[4654]: USER_END pid=4654 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.389039 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 10:28:11.389615 systemd[1]: sshd@13-10.0.0.3:22-10.0.0.1:59454.service: Deactivated successfully. Feb 9 10:28:11.386000 audit[4654]: CRED_DISP pid=4654 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.390535 systemd-logind[1124]: Session 14 logged out. Waiting for processes to exit. Feb 9 10:28:11.391083 systemd-logind[1124]: Removed session 14. Feb 9 10:28:11.392359 kernel: audit: type=1106 audit(1707474491.386:1395): pid=4654 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.392408 kernel: audit: type=1104 audit(1707474491.386:1396): pid=4654 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:11.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.3:22-10.0.0.1:59454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.391117 systemd[1]: Started sshd@14-10.0.0.3:22-10.0.0.1:35666.service. Feb 9 10:28:16.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.3:22-10.0.0.1:35666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.391849 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:28:16.391901 kernel: audit: type=1130 audit(1707474496.389:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.3:22-10.0.0.1:35666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.421000 audit[4669]: USER_ACCT pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.422928 sshd[4669]: Accepted publickey for core from 10.0.0.1 port 35666 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:16.423882 sshd[4669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:16.422000 audit[4669]: CRED_ACQ pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.427920 kernel: audit: type=1101 audit(1707474496.421:1399): pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.428098 kernel: audit: type=1103 audit(1707474496.422:1400): pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.428135 kernel: audit: type=1006 audit(1707474496.422:1401): pid=4669 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 10:28:16.428064 systemd[1]: Started session-15.scope. Feb 9 10:28:16.422000 audit[4669]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1a64da0 a2=3 a3=1 items=0 ppid=1 pid=4669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.428517 systemd-logind[1124]: New session 15 of user core. Feb 9 10:28:16.431418 kernel: audit: type=1300 audit(1707474496.422:1401): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1a64da0 a2=3 a3=1 items=0 ppid=1 pid=4669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:16.431461 kernel: audit: type=1327 audit(1707474496.422:1401): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:16.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:16.433000 audit[4669]: USER_START pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.434000 audit[4672]: CRED_ACQ pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.440117 kernel: audit: type=1105 audit(1707474496.433:1402): pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.440157 kernel: audit: type=1103 audit(1707474496.434:1403): pid=4672 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.543820 sshd[4669]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:16.543000 audit[4669]: USER_END pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.546593 systemd[1]: sshd@14-10.0.0.3:22-10.0.0.1:35666.service: Deactivated successfully. Feb 9 10:28:16.543000 audit[4669]: CRED_DISP pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.547363 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 10:28:16.547965 systemd-logind[1124]: Session 15 logged out. Waiting for processes to exit. Feb 9 10:28:16.548620 systemd-logind[1124]: Removed session 15. Feb 9 10:28:16.549505 kernel: audit: type=1106 audit(1707474496.543:1404): pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.549556 kernel: audit: type=1104 audit(1707474496.543:1405): pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:16.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.3:22-10.0.0.1:35666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:20.247000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:20.247000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f81360 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:28:20.247000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:20.250000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:20.250000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f81380 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:28:20.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:20.252000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:20.252000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002825940 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:28:20.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:20.253000 audit[1922]: AVC avc: denied { watch } for pid=1922 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:20.253000 audit[1922]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001fd7140 a2=fc6 a3=0 items=0 ppid=1764 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c674 key=(null) Feb 9 10:28:20.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:21.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.3:22-10.0.0.1:35678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:21.548936 systemd[1]: Started sshd@15-10.0.0.3:22-10.0.0.1:35678.service. Feb 9 10:28:21.549665 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:28:21.549707 kernel: audit: type=1130 audit(1707474501.547:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.3:22-10.0.0.1:35678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:21.579000 audit[4684]: USER_ACCT pid=4684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.581443 sshd[4684]: Accepted publickey for core from 10.0.0.1 port 35678 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:21.582779 sshd[4684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:21.581000 audit[4684]: CRED_ACQ pid=4684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.586169 kernel: audit: type=1101 audit(1707474501.579:1412): pid=4684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.586231 kernel: audit: type=1103 audit(1707474501.581:1413): pid=4684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.586265 kernel: audit: type=1006 audit(1707474501.581:1414): pid=4684 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 10:28:21.586493 systemd-logind[1124]: New session 16 of user core. Feb 9 10:28:21.587035 systemd[1]: Started session-16.scope. Feb 9 10:28:21.581000 audit[4684]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff419ad40 a2=3 a3=1 items=0 ppid=1 pid=4684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:21.590177 kernel: audit: type=1300 audit(1707474501.581:1414): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff419ad40 a2=3 a3=1 items=0 ppid=1 pid=4684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:21.590213 kernel: audit: type=1327 audit(1707474501.581:1414): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:21.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:21.590000 audit[4684]: USER_START pid=4684 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.591000 audit[4686]: CRED_ACQ pid=4686 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.597056 kernel: audit: type=1105 audit(1707474501.590:1415): pid=4684 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.597126 kernel: audit: type=1103 audit(1707474501.591:1416): pid=4686 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.706883 sshd[4684]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:21.708000 audit[4684]: USER_END pid=4684 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.711512 systemd-logind[1124]: Session 16 logged out. Waiting for processes to exit. Feb 9 10:28:21.711674 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 10:28:21.708000 audit[4684]: CRED_DISP pid=4684 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.712609 systemd-logind[1124]: Removed session 16. Feb 9 10:28:21.712837 systemd[1]: sshd@15-10.0.0.3:22-10.0.0.1:35678.service: Deactivated successfully. Feb 9 10:28:21.714365 kernel: audit: type=1106 audit(1707474501.708:1417): pid=4684 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.714434 kernel: audit: type=1104 audit(1707474501.708:1418): pid=4684 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:21.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.3:22-10.0.0.1:35678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:22.129232 kubelet[2038]: I0209 10:28:22.129189 2038 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:28:22.134620 kubelet[2038]: W0209 10:28:22.134519 2038 reflector.go:424] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'localhost' and this object Feb 9 10:28:22.134746 systemd[1]: Created slice kubepods-besteffort-pod846f34e3_c3b9_4a5f_8814_8c3d8ad8939c.slice. Feb 9 10:28:22.135375 kubelet[2038]: E0209 10:28:22.135238 2038 reflector.go:140] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'localhost' and this object Feb 9 10:28:22.177000 audit[4722]: NETFILTER_CFG table=filter:127 family=2 entries=7 op=nft_register_rule pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.177000 audit[4722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffc0e6d360 a2=0 a3=ffff97bad6c0 items=0 ppid=2217 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.178000 audit[4722]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.178000 audit[4722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc0e6d360 a2=0 a3=ffff97bad6c0 items=0 ppid=2217 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.218000 audit[4748]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.218000 audit[4748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffc8925d00 a2=0 a3=ffffb1eed6c0 items=0 ppid=2217 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.220000 audit[4748]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=4748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:22.220000 audit[4748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc8925d00 a2=0 a3=ffffb1eed6c0 items=0 ppid=2217 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:22.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:22.241558 kubelet[2038]: I0209 10:28:22.241531 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/846f34e3-c3b9-4a5f-8814-8c3d8ad8939c-calico-apiserver-certs\") pod \"calico-apiserver-5898c4df76-4q4wq\" (UID: \"846f34e3-c3b9-4a5f-8814-8c3d8ad8939c\") " pod="calico-apiserver/calico-apiserver-5898c4df76-4q4wq" Feb 9 10:28:22.241665 kubelet[2038]: I0209 10:28:22.241624 2038 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjfnp\" (UniqueName: \"kubernetes.io/projected/846f34e3-c3b9-4a5f-8814-8c3d8ad8939c-kube-api-access-wjfnp\") pod \"calico-apiserver-5898c4df76-4q4wq\" (UID: \"846f34e3-c3b9-4a5f-8814-8c3d8ad8939c\") " pod="calico-apiserver/calico-apiserver-5898c4df76-4q4wq" Feb 9 10:28:23.357205 kubelet[2038]: E0209 10:28:23.357176 2038 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 10:28:23.357875 kubelet[2038]: E0209 10:28:23.357626 2038 projected.go:198] Error preparing data for projected volume kube-api-access-wjfnp for pod calico-apiserver/calico-apiserver-5898c4df76-4q4wq: failed to sync configmap cache: timed out waiting for the condition Feb 9 10:28:23.358038 kubelet[2038]: E0209 10:28:23.358023 2038 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/846f34e3-c3b9-4a5f-8814-8c3d8ad8939c-kube-api-access-wjfnp podName:846f34e3-c3b9-4a5f-8814-8c3d8ad8939c nodeName:}" failed. No retries permitted until 2024-02-09 10:28:23.857995384 +0000 UTC m=+75.753250207 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-wjfnp" (UniqueName: "kubernetes.io/projected/846f34e3-c3b9-4a5f-8814-8c3d8ad8939c-kube-api-access-wjfnp") pod "calico-apiserver-5898c4df76-4q4wq" (UID: "846f34e3-c3b9-4a5f-8814-8c3d8ad8939c") : failed to sync configmap cache: timed out waiting for the condition Feb 9 10:28:24.237813 env[1140]: time="2024-02-09T10:28:24.237762360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5898c4df76-4q4wq,Uid:846f34e3-c3b9-4a5f-8814-8c3d8ad8939c,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:28:24.336497 systemd-networkd[1040]: cali0923c0e88e2: Link UP Feb 9 10:28:24.337677 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:28:24.337741 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0923c0e88e2: link becomes ready Feb 9 10:28:24.337722 systemd-networkd[1040]: cali0923c0e88e2: Gained carrier Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.276 [INFO][4753] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0 calico-apiserver-5898c4df76- calico-apiserver 846f34e3-c3b9-4a5f-8814-8c3d8ad8939c 1003 0 2024-02-09 10:28:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5898c4df76 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5898c4df76-4q4wq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0923c0e88e2 [] []}} ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.276 [INFO][4753] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.298 [INFO][4767] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" HandleID="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Workload="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.311 [INFO][4767] ipam_plugin.go 268: Auto assigning IP ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" HandleID="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Workload="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005a0370), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5898c4df76-4q4wq", "timestamp":"2024-02-09 10:28:24.298591408 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.311 [INFO][4767] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.311 [INFO][4767] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.312 [INFO][4767] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.313 [INFO][4767] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.316 [INFO][4767] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.320 [INFO][4767] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.321 [INFO][4767] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.323 [INFO][4767] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.323 [INFO][4767] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.325 [INFO][4767] ipam.go 1682: Creating new handle: k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.327 [INFO][4767] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.332 [INFO][4767] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.332 [INFO][4767] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" host="localhost" Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.332 [INFO][4767] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:28:24.353742 env[1140]: 2024-02-09 10:28:24.332 [INFO][4767] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" HandleID="k8s-pod-network.6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Workload="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.354316 env[1140]: 2024-02-09 10:28:24.334 [INFO][4753] k8s.go 385: Populated endpoint ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0", GenerateName:"calico-apiserver-5898c4df76-", Namespace:"calico-apiserver", SelfLink:"", UID:"846f34e3-c3b9-4a5f-8814-8c3d8ad8939c", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5898c4df76", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5898c4df76-4q4wq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0923c0e88e2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:24.354316 env[1140]: 2024-02-09 10:28:24.334 [INFO][4753] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.354316 env[1140]: 2024-02-09 10:28:24.334 [INFO][4753] dataplane_linux.go 68: Setting the host side veth name to cali0923c0e88e2 ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.354316 env[1140]: 2024-02-09 10:28:24.338 [INFO][4753] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.354316 env[1140]: 2024-02-09 10:28:24.338 [INFO][4753] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0", GenerateName:"calico-apiserver-5898c4df76-", Namespace:"calico-apiserver", SelfLink:"", UID:"846f34e3-c3b9-4a5f-8814-8c3d8ad8939c", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 28, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5898c4df76", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd", Pod:"calico-apiserver-5898c4df76-4q4wq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0923c0e88e2", MAC:"02:8a:97:d5:fa:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:28:24.354316 env[1140]: 2024-02-09 10:28:24.350 [INFO][4753] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd" Namespace="calico-apiserver" Pod="calico-apiserver-5898c4df76-4q4wq" WorkloadEndpoint="localhost-k8s-calico--apiserver--5898c4df76--4q4wq-eth0" Feb 9 10:28:24.365000 audit[4795]: NETFILTER_CFG table=filter:131 family=2 entries=51 op=nft_register_chain pid=4795 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:28:24.365000 audit[4795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26900 a0=3 a1=ffffd489b700 a2=0 a3=ffffbebc9fa8 items=0 ppid=3261 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:24.365000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:28:24.367949 env[1140]: time="2024-02-09T10:28:24.367890129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:28:24.368045 env[1140]: time="2024-02-09T10:28:24.367937770Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:28:24.368045 env[1140]: time="2024-02-09T10:28:24.367948290Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:28:24.368140 env[1140]: time="2024-02-09T10:28:24.368082330Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd pid=4802 runtime=io.containerd.runc.v2 Feb 9 10:28:24.386458 systemd[1]: Started cri-containerd-6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd.scope. Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.422000 audit: BPF prog-id=185 op=LOAD Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4802 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:24.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663362316665633162323437386165303135306634303163623430 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4802 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:24.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663362316665633162323437386165303135306634303163623430 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit: BPF prog-id=186 op=LOAD Feb 9 10:28:24.423000 audit[4812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4802 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:24.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663362316665633162323437386165303135306634303163623430 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit: BPF prog-id=187 op=LOAD Feb 9 10:28:24.423000 audit[4812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4802 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:24.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663362316665633162323437386165303135306634303163623430 Feb 9 10:28:24.423000 audit: BPF prog-id=187 op=UNLOAD Feb 9 10:28:24.423000 audit: BPF prog-id=186 op=UNLOAD Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:24.423000 audit: BPF prog-id=188 op=LOAD Feb 9 10:28:24.423000 audit[4812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4802 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:24.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664663362316665633162323437386165303135306634303163623430 Feb 9 10:28:24.425546 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 10:28:24.443678 env[1140]: time="2024-02-09T10:28:24.443639238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5898c4df76-4q4wq,Uid:846f34e3-c3b9-4a5f-8814-8c3d8ad8939c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd\"" Feb 9 10:28:24.446730 env[1140]: time="2024-02-09T10:28:24.446700290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:28:24.956610 systemd[1]: run-containerd-runc-k8s.io-6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd-runc.1uzjQ7.mount: Deactivated successfully. Feb 9 10:28:25.732788 systemd-networkd[1040]: cali0923c0e88e2: Gained IPv6LL Feb 9 10:28:26.550938 env[1140]: time="2024-02-09T10:28:26.550896824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:26.553537 env[1140]: time="2024-02-09T10:28:26.553505157Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:26.555485 env[1140]: time="2024-02-09T10:28:26.555442887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:26.557733 env[1140]: time="2024-02-09T10:28:26.557702659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:26.558673 env[1140]: time="2024-02-09T10:28:26.558639504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:28:26.560964 env[1140]: time="2024-02-09T10:28:26.560923876Z" level=info msg="CreateContainer within sandbox \"6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:28:26.573737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1434586280.mount: Deactivated successfully. Feb 9 10:28:26.577010 env[1140]: time="2024-02-09T10:28:26.576978521Z" level=info msg="CreateContainer within sandbox \"6df3b1fec1b2478ae0150f401cb406ce14ead05329ebd7170084c9565698cdcd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0fdc183d169f553dae80b0bab72278b4f24ae4007f072a9ec52e422dd35b853c\"" Feb 9 10:28:26.577873 env[1140]: time="2024-02-09T10:28:26.577808165Z" level=info msg="StartContainer for \"0fdc183d169f553dae80b0bab72278b4f24ae4007f072a9ec52e422dd35b853c\"" Feb 9 10:28:26.597783 systemd[1]: Started cri-containerd-0fdc183d169f553dae80b0bab72278b4f24ae4007f072a9ec52e422dd35b853c.scope. Feb 9 10:28:26.602849 systemd[1]: run-containerd-runc-k8s.io-0fdc183d169f553dae80b0bab72278b4f24ae4007f072a9ec52e422dd35b853c-runc.ytvRVL.mount: Deactivated successfully. Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.633627 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 10:28:26.633677 kernel: audit: type=1400 audit(1707474506.631:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.637437 kernel: audit: type=1400 audit(1707474506.631:1444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.637508 kernel: audit: type=1400 audit(1707474506.631:1445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.641175 kernel: audit: type=1400 audit(1707474506.631:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.641255 kernel: audit: type=1400 audit(1707474506.631:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.644978 kernel: audit: type=1400 audit(1707474506.631:1448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.645040 kernel: audit: type=1400 audit(1707474506.631:1449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.649010 kernel: audit: type=1400 audit(1707474506.631:1450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.649175 kernel: audit: type=1400 audit(1707474506.631:1451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.652916 kernel: audit: type=1400 audit(1707474506.632:1452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.632000 audit: BPF prog-id=189 op=LOAD Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=4802 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066646331383364313639663535336461653830623062616237323237 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=4802 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066646331383364313639663535336461653830623062616237323237 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.636000 audit: BPF prog-id=190 op=LOAD Feb 9 10:28:26.636000 audit[4848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=4802 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066646331383364313639663535336461653830623062616237323237 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.638000 audit: BPF prog-id=191 op=LOAD Feb 9 10:28:26.638000 audit[4848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=4802 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066646331383364313639663535336461653830623062616237323237 Feb 9 10:28:26.640000 audit: BPF prog-id=191 op=UNLOAD Feb 9 10:28:26.640000 audit: BPF prog-id=190 op=UNLOAD Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:26.640000 audit: BPF prog-id=192 op=LOAD Feb 9 10:28:26.640000 audit[4848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=4802 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066646331383364313639663535336461653830623062616237323237 Feb 9 10:28:26.679847 env[1140]: time="2024-02-09T10:28:26.679801141Z" level=info msg="StartContainer for \"0fdc183d169f553dae80b0bab72278b4f24ae4007f072a9ec52e422dd35b853c\" returns successfully" Feb 9 10:28:26.711008 systemd[1]: Started sshd@16-10.0.0.3:22-10.0.0.1:48892.service. Feb 9 10:28:26.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.3:22-10.0.0.1:48892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.748000 audit[4877]: USER_ACCT pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.749797 sshd[4877]: Accepted publickey for core from 10.0.0.1 port 48892 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:26.749000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.749000 audit[4877]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff86d2240 a2=3 a3=1 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.749000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:26.751675 sshd[4877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:26.756372 systemd[1]: Started session-17.scope. Feb 9 10:28:26.756682 systemd-logind[1124]: New session 17 of user core. Feb 9 10:28:26.758000 audit[4877]: USER_START pid=4877 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.760000 audit[4881]: CRED_ACQ pid=4881 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.888686 sshd[4877]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:26.892075 systemd[1]: Started sshd@17-10.0.0.3:22-10.0.0.1:48898.service. Feb 9 10:28:26.894009 systemd[1]: sshd@16-10.0.0.3:22-10.0.0.1:48892.service: Deactivated successfully. Feb 9 10:28:26.894738 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 10:28:26.895398 systemd-logind[1124]: Session 17 logged out. Waiting for processes to exit. Feb 9 10:28:26.896046 systemd-logind[1124]: Removed session 17. Feb 9 10:28:26.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.3:22-10.0.0.1:48898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.891000 audit[4877]: USER_END pid=4877 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.891000 audit[4877]: CRED_DISP pid=4877 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.3:22-10.0.0.1:48892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.922000 audit[4895]: USER_ACCT pid=4895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.923710 sshd[4895]: Accepted publickey for core from 10.0.0.1 port 48898 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:26.923000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.923000 audit[4895]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdebd0aa0 a2=3 a3=1 items=0 ppid=1 pid=4895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:26.923000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:26.925104 sshd[4895]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:26.929058 systemd-logind[1124]: New session 18 of user core. Feb 9 10:28:26.929416 systemd[1]: Started session-18.scope. Feb 9 10:28:26.932000 audit[4895]: USER_START pid=4895 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:26.933000 audit[4898]: CRED_ACQ pid=4898 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.203462 sshd[4895]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:27.207481 systemd[1]: Started sshd@18-10.0.0.3:22-10.0.0.1:48906.service. Feb 9 10:28:27.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:48906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.207000 audit[4895]: USER_END pid=4895 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.207000 audit[4895]: CRED_DISP pid=4895 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.216108 systemd-logind[1124]: Session 18 logged out. Waiting for processes to exit. Feb 9 10:28:27.217737 systemd[1]: sshd@17-10.0.0.3:22-10.0.0.1:48898.service: Deactivated successfully. Feb 9 10:28:27.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.3:22-10.0.0.1:48898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.218539 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 10:28:27.219251 systemd-logind[1124]: Removed session 18. Feb 9 10:28:27.235818 kubelet[2038]: E0209 10:28:27.235797 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:27.241000 audit[4906]: USER_ACCT pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.243009 sshd[4906]: Accepted publickey for core from 10.0.0.1 port 48906 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:27.242000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.242000 audit[4906]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7a383f0 a2=3 a3=1 items=0 ppid=1 pid=4906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:27.244405 sshd[4906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:27.248346 systemd[1]: Started session-19.scope. Feb 9 10:28:27.248744 systemd-logind[1124]: New session 19 of user core. Feb 9 10:28:27.251000 audit[4906]: USER_START pid=4906 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.252000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:27.471414 kubelet[2038]: I0209 10:28:27.471301 2038 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5898c4df76-4q4wq" podStartSLOduration=-9.223372031383507e+09 pod.CreationTimestamp="2024-02-09 10:28:22 +0000 UTC" firstStartedPulling="2024-02-09 10:28:24.444833682 +0000 UTC m=+76.340088505" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:28:27.469872439 +0000 UTC m=+79.365127222" watchObservedRunningTime="2024-02-09 10:28:27.471268087 +0000 UTC m=+79.366522910" Feb 9 10:28:27.507000 audit[4942]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:27.507000 audit[4942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffcac11530 a2=0 a3=ffff8721f6c0 items=0 ppid=2217 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:27.509000 audit[4942]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:27.509000 audit[4942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffcac11530 a2=0 a3=ffff8721f6c0 items=0 ppid=2217 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:27.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:27.984000 audit[4859]: AVC avc: denied { watch } for pid=4859 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_28_22.1933157846/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c866 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c657,c866 tclass=file permissive=0 Feb 9 10:28:27.984000 audit[4859]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e35e00 a2=fc6 a3=0 items=0 ppid=4802 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c866 key=(null) Feb 9 10:28:27.984000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:28:28.391000 audit[4975]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=4975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:28.391000 audit[4975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffee7916e0 a2=0 a3=ffff92a0b6c0 items=0 ppid=2217 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:28.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:28.392000 audit[4975]: NETFILTER_CFG table=nat:135 family=2 entries=78 op=nft_register_rule pid=4975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:28.392000 audit[4975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffee7916e0 a2=0 a3=ffff92a0b6c0 items=0 ppid=2217 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:28.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:29.029673 sshd[4906]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:29.033190 systemd[1]: Started sshd@19-10.0.0.3:22-10.0.0.1:48912.service. Feb 9 10:28:29.031000 audit[4906]: USER_END pid=4906 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.031000 audit[4906]: CRED_DISP pid=4906 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:48912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:29.034684 systemd[1]: sshd@18-10.0.0.3:22-10.0.0.1:48906.service: Deactivated successfully. Feb 9 10:28:29.035415 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 10:28:29.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:48906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:29.038478 systemd-logind[1124]: Session 19 logged out. Waiting for processes to exit. Feb 9 10:28:29.042954 systemd-logind[1124]: Removed session 19. Feb 9 10:28:29.071617 sshd[4981]: Accepted publickey for core from 10.0.0.1 port 48912 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:29.070000 audit[4981]: USER_ACCT pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.073004 sshd[4981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:29.071000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.071000 audit[4981]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe30a7340 a2=3 a3=1 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:29.077607 systemd[1]: Started session-20.scope. Feb 9 10:28:29.077749 systemd-logind[1124]: New session 20 of user core. Feb 9 10:28:29.080000 audit[4981]: USER_START pid=4981 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.082000 audit[4992]: CRED_ACQ pid=4992 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.107000 audit[5006]: NETFILTER_CFG table=filter:136 family=2 entries=20 op=nft_register_rule pid=5006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:29.107000 audit[5006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11068 a0=3 a1=ffffd9dc6f20 a2=0 a3=ffff9587d6c0 items=0 ppid=2217 pid=5006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:29.108000 audit[5006]: NETFILTER_CFG table=nat:137 family=2 entries=78 op=nft_register_rule pid=5006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:29.108000 audit[5006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd9dc6f20 a2=0 a3=ffff9587d6c0 items=0 ppid=2217 pid=5006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:29.316031 sshd[4981]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:29.319981 systemd[1]: Started sshd@20-10.0.0.3:22-10.0.0.1:48926.service. Feb 9 10:28:29.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:48926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:29.320000 audit[4981]: USER_END pid=4981 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.320000 audit[4981]: CRED_DISP pid=4981 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.323345 systemd[1]: sshd@19-10.0.0.3:22-10.0.0.1:48912.service: Deactivated successfully. Feb 9 10:28:29.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:48912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:29.324097 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 10:28:29.324619 systemd-logind[1124]: Session 20 logged out. Waiting for processes to exit. Feb 9 10:28:29.325206 systemd-logind[1124]: Removed session 20. Feb 9 10:28:29.350000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.351840 sshd[5014]: Accepted publickey for core from 10.0.0.1 port 48926 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:29.351000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.351000 audit[5014]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffaeda8e0 a2=3 a3=1 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:29.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:29.352921 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:29.356194 systemd-logind[1124]: New session 21 of user core. Feb 9 10:28:29.356744 systemd[1]: Started session-21.scope. Feb 9 10:28:29.358000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.359000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.507022 sshd[5014]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:29.507000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.507000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:29.510206 systemd[1]: sshd@20-10.0.0.3:22-10.0.0.1:48926.service: Deactivated successfully. Feb 9 10:28:29.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:48926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:29.510966 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 10:28:29.511575 systemd-logind[1124]: Session 21 logged out. Waiting for processes to exit. Feb 9 10:28:29.512331 systemd-logind[1124]: Removed session 21. Feb 9 10:28:30.146000 audit[5077]: NETFILTER_CFG table=filter:138 family=2 entries=32 op=nft_register_rule pid=5077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:30.146000 audit[5077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11068 a0=3 a1=fffff5ef9f30 a2=0 a3=ffff9e0d06c0 items=0 ppid=2217 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:30.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:30.148000 audit[5077]: NETFILTER_CFG table=nat:139 family=2 entries=78 op=nft_register_rule pid=5077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:30.148000 audit[5077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffff5ef9f30 a2=0 a3=ffff9e0d06c0 items=0 ppid=2217 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:30.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:33.387103 systemd[1]: run-containerd-runc-k8s.io-f6a5b676a53b15c9df2d8d59df311ae22856a8ca5c9eedd5a08872301c61a72e-runc.P62hwI.mount: Deactivated successfully. Feb 9 10:28:34.400000 audit[5125]: NETFILTER_CFG table=filter:140 family=2 entries=20 op=nft_register_rule pid=5125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:34.404328 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 9 10:28:34.404410 kernel: audit: type=1325 audit(1707474514.400:1515): table=filter:140 family=2 entries=20 op=nft_register_rule pid=5125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:34.404443 kernel: audit: type=1300 audit(1707474514.400:1515): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffecbdb3c0 a2=0 a3=ffff856e36c0 items=0 ppid=2217 pid=5125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.400000 audit[5125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffecbdb3c0 a2=0 a3=ffff856e36c0 items=0 ppid=2217 pid=5125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:34.408775 kernel: audit: type=1327 audit(1707474514.400:1515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:34.404000 audit[5125]: NETFILTER_CFG table=nat:141 family=2 entries=162 op=nft_register_chain pid=5125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:34.404000 audit[5125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=ffffecbdb3c0 a2=0 a3=ffff856e36c0 items=0 ppid=2217 pid=5125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.416354 kernel: audit: type=1325 audit(1707474514.404:1516): table=nat:141 family=2 entries=162 op=nft_register_chain pid=5125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:34.416414 kernel: audit: type=1300 audit(1707474514.404:1516): arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=ffffecbdb3c0 a2=0 a3=ffff856e36c0 items=0 ppid=2217 pid=5125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.416438 kernel: audit: type=1327 audit(1707474514.404:1516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:34.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:34.511161 systemd[1]: Started sshd@21-10.0.0.3:22-10.0.0.1:38720.service. Feb 9 10:28:34.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:34.514544 kernel: audit: type=1130 audit(1707474514.509:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:34.541000 audit[5128]: USER_ACCT pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.542000 audit[5128]: CRED_ACQ pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.543797 sshd[5128]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:34.545429 sshd[5128]: Accepted publickey for core from 10.0.0.1 port 38720 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:34.547220 kernel: audit: type=1101 audit(1707474514.541:1518): pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.547275 kernel: audit: type=1103 audit(1707474514.542:1519): pid=5128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.548918 kernel: audit: type=1006 audit(1707474514.542:1520): pid=5128 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 10:28:34.542000 audit[5128]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4bbfad0 a2=3 a3=1 items=0 ppid=1 pid=5128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:34.552725 systemd-logind[1124]: New session 22 of user core. Feb 9 10:28:34.553328 systemd[1]: Started session-22.scope. Feb 9 10:28:34.555000 audit[5128]: USER_START pid=5128 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.557000 audit[5130]: CRED_ACQ pid=5130 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.677771 sshd[5128]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:34.677000 audit[5128]: USER_END pid=5128 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.677000 audit[5128]: CRED_DISP pid=5128 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:34.680751 systemd[1]: sshd@21-10.0.0.3:22-10.0.0.1:38720.service: Deactivated successfully. Feb 9 10:28:34.680924 systemd-logind[1124]: Session 22 logged out. Waiting for processes to exit. Feb 9 10:28:34.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:34.681504 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 10:28:34.682058 systemd-logind[1124]: Removed session 22. Feb 9 10:28:39.236061 kubelet[2038]: E0209 10:28:39.236023 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:39.236469 kubelet[2038]: E0209 10:28:39.236282 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 10:28:39.682741 systemd[1]: Started sshd@22-10.0.0.3:22-10.0.0.1:38726.service. Feb 9 10:28:39.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:38726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:39.683433 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:28:39.683474 kernel: audit: type=1130 audit(1707474519.681:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:38726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:39.712000 audit[5143]: USER_ACCT pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.714206 sshd[5143]: Accepted publickey for core from 10.0.0.1 port 38726 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:39.715593 sshd[5143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:39.713000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.718843 kernel: audit: type=1101 audit(1707474519.712:1527): pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.718890 kernel: audit: type=1103 audit(1707474519.713:1528): pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.718923 kernel: audit: type=1006 audit(1707474519.713:1529): pid=5143 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 10:28:39.713000 audit[5143]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8b66940 a2=3 a3=1 items=0 ppid=1 pid=5143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:39.720538 systemd[1]: Started session-23.scope. Feb 9 10:28:39.720838 systemd-logind[1124]: New session 23 of user core. Feb 9 10:28:39.722531 kernel: audit: type=1300 audit(1707474519.713:1529): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8b66940 a2=3 a3=1 items=0 ppid=1 pid=5143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:39.722580 kernel: audit: type=1327 audit(1707474519.713:1529): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:39.713000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:39.723000 audit[5143]: USER_START pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.724000 audit[5145]: CRED_ACQ pid=5145 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.729358 kernel: audit: type=1105 audit(1707474519.723:1530): pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.729415 kernel: audit: type=1103 audit(1707474519.724:1531): pid=5145 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.845274 sshd[5143]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:39.845000 audit[5143]: USER_END pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.848483 systemd-logind[1124]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:28:39.845000 audit[5143]: CRED_DISP pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.848771 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:28:39.849715 systemd[1]: sshd@22-10.0.0.3:22-10.0.0.1:38726.service: Deactivated successfully. Feb 9 10:28:39.850981 systemd-logind[1124]: Removed session 23. Feb 9 10:28:39.851074 kernel: audit: type=1106 audit(1707474519.845:1532): pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.851103 kernel: audit: type=1104 audit(1707474519.845:1533): pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:39.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:38726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:44.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:44.850563 systemd[1]: Started sshd@23-10.0.0.3:22-10.0.0.1:56792.service. Feb 9 10:28:44.853152 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:28:44.853225 kernel: audit: type=1130 audit(1707474524.849:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:44.880000 audit[5160]: USER_ACCT pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.881889 sshd[5160]: Accepted publickey for core from 10.0.0.1 port 56792 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:44.883237 sshd[5160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:44.881000 audit[5160]: CRED_ACQ pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.886342 kernel: audit: type=1101 audit(1707474524.880:1536): pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.886448 kernel: audit: type=1103 audit(1707474524.881:1537): pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.886474 kernel: audit: type=1006 audit(1707474524.881:1538): pid=5160 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 10:28:44.887266 systemd[1]: Started session-24.scope. Feb 9 10:28:44.881000 audit[5160]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa507bf0 a2=3 a3=1 items=0 ppid=1 pid=5160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.887732 systemd-logind[1124]: New session 24 of user core. Feb 9 10:28:44.890051 kernel: audit: type=1300 audit(1707474524.881:1538): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa507bf0 a2=3 a3=1 items=0 ppid=1 pid=5160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:44.890149 kernel: audit: type=1327 audit(1707474524.881:1538): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:44.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:44.890000 audit[5160]: USER_START pid=5160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.891000 audit[5162]: CRED_ACQ pid=5162 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.896484 kernel: audit: type=1105 audit(1707474524.890:1539): pid=5160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:44.896536 kernel: audit: type=1103 audit(1707474524.891:1540): pid=5162 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:45.018706 sshd[5160]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:45.018000 audit[5160]: USER_END pid=5160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:45.018000 audit[5160]: CRED_DISP pid=5160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:45.021269 systemd[1]: sshd@23-10.0.0.3:22-10.0.0.1:56792.service: Deactivated successfully. Feb 9 10:28:45.022068 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:28:45.023064 systemd-logind[1124]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:28:45.025088 kernel: audit: type=1106 audit(1707474525.018:1541): pid=5160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:45.025175 kernel: audit: type=1104 audit(1707474525.018:1542): pid=5160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:45.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:45.025302 systemd-logind[1124]: Removed session 24. Feb 9 10:28:50.023648 systemd[1]: Started sshd@24-10.0.0.3:22-10.0.0.1:56796.service. Feb 9 10:28:50.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:56796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:50.026436 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:28:50.026480 kernel: audit: type=1130 audit(1707474530.022:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:56796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:50.053000 audit[5175]: USER_ACCT pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.055134 sshd[5175]: Accepted publickey for core from 10.0.0.1 port 56796 ssh2: RSA SHA256:Tff7LiSM4t+dNOV5ML2aA6jRrToS0axub4nFokrxhpk Feb 9 10:28:50.056515 sshd[5175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:50.054000 audit[5175]: CRED_ACQ pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.059510 kernel: audit: type=1101 audit(1707474530.053:1545): pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.059550 kernel: audit: type=1103 audit(1707474530.054:1546): pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.060543 systemd-logind[1124]: New session 25 of user core. Feb 9 10:28:50.060620 systemd[1]: Started session-25.scope. Feb 9 10:28:50.060970 kernel: audit: type=1006 audit(1707474530.054:1547): pid=5175 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 10:28:50.054000 audit[5175]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdecddeb0 a2=3 a3=1 items=0 ppid=1 pid=5175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:50.063428 kernel: audit: type=1300 audit(1707474530.054:1547): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdecddeb0 a2=3 a3=1 items=0 ppid=1 pid=5175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:50.063491 kernel: audit: type=1327 audit(1707474530.054:1547): proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:50.054000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:50.062000 audit[5175]: USER_START pid=5175 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.066899 kernel: audit: type=1105 audit(1707474530.062:1548): pid=5175 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.063000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.068971 kernel: audit: type=1103 audit(1707474530.063:1549): pid=5177 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.187064 sshd[5175]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:50.186000 audit[5175]: USER_END pid=5175 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.189849 systemd[1]: sshd@24-10.0.0.3:22-10.0.0.1:56796.service: Deactivated successfully. Feb 9 10:28:50.190623 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 10:28:50.186000 audit[5175]: CRED_DISP pid=5175 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.191190 systemd-logind[1124]: Session 25 logged out. Waiting for processes to exit. Feb 9 10:28:50.191810 systemd-logind[1124]: Removed session 25. Feb 9 10:28:50.192993 kernel: audit: type=1106 audit(1707474530.186:1550): pid=5175 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.193050 kernel: audit: type=1104 audit(1707474530.186:1551): pid=5175 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 10:28:50.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:56796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:50.235808 kubelet[2038]: E0209 10:28:50.235787 2038 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"