Feb 12 19:29:28.768536 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:29:28.768559 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:29:28.768567 kernel: efi: EFI v2.70 by EDK II Feb 12 19:29:28.768573 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 12 19:29:28.768578 kernel: random: crng init done Feb 12 19:29:28.768584 kernel: ACPI: Early table checksum verification disabled Feb 12 19:29:28.768590 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 12 19:29:28.768597 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:29:28.768603 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768608 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768614 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768619 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768624 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768630 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768637 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768643 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768649 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:29:28.768655 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 12 19:29:28.768661 kernel: NUMA: Failed to initialise from firmware Feb 12 19:29:28.768667 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:29:28.768672 kernel: NUMA: NODE_DATA [mem 0xdcb0c900-0xdcb11fff] Feb 12 19:29:28.768678 kernel: Zone ranges: Feb 12 19:29:28.768684 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:29:28.768691 kernel: DMA32 empty Feb 12 19:29:28.768697 kernel: Normal empty Feb 12 19:29:28.768703 kernel: Movable zone start for each node Feb 12 19:29:28.768708 kernel: Early memory node ranges Feb 12 19:29:28.768714 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 12 19:29:28.768720 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 12 19:29:28.768726 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 12 19:29:28.768732 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 12 19:29:28.768738 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 12 19:29:28.768743 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 12 19:29:28.768749 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 12 19:29:28.768755 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:29:28.768762 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 12 19:29:28.768768 kernel: psci: probing for conduit method from ACPI. Feb 12 19:29:28.768774 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:29:28.768779 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:29:28.768785 kernel: psci: Trusted OS migration not required Feb 12 19:29:28.768802 kernel: psci: SMC Calling Convention v1.1 Feb 12 19:29:28.768808 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 12 19:29:28.768816 kernel: ACPI: SRAT not present Feb 12 19:29:28.768822 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:29:28.768828 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:29:28.768835 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 12 19:29:28.768841 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:29:28.768847 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:29:28.768853 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:29:28.768880 kernel: CPU features: detected: Spectre-v4 Feb 12 19:29:28.768886 kernel: CPU features: detected: Spectre-BHB Feb 12 19:29:28.768893 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:29:28.768900 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:29:28.768906 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:29:28.768913 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 12 19:29:28.768919 kernel: Policy zone: DMA Feb 12 19:29:28.768926 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:29:28.768933 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:29:28.768939 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:29:28.768945 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:29:28.768952 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:29:28.768958 kernel: Memory: 2459156K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113132K reserved, 0K cma-reserved) Feb 12 19:29:28.769044 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:29:28.769051 kernel: trace event string verifier disabled Feb 12 19:29:28.769057 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:29:28.769064 kernel: rcu: RCU event tracing is enabled. Feb 12 19:29:28.769070 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:29:28.769076 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:29:28.769083 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:29:28.769089 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:29:28.769095 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:29:28.769102 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:29:28.769108 kernel: GICv3: 256 SPIs implemented Feb 12 19:29:28.769116 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:29:28.769122 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:29:28.769128 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:29:28.769134 kernel: GICv3: 16 PPIs implemented Feb 12 19:29:28.769140 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 12 19:29:28.769146 kernel: ACPI: SRAT not present Feb 12 19:29:28.769153 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 12 19:29:28.769159 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 12 19:29:28.769166 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 12 19:29:28.769172 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 12 19:29:28.769178 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 12 19:29:28.769185 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:29:28.769192 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:29:28.769199 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:29:28.769205 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:29:28.769211 kernel: arm-pv: using stolen time PV Feb 12 19:29:28.769217 kernel: Console: colour dummy device 80x25 Feb 12 19:29:28.769224 kernel: ACPI: Core revision 20210730 Feb 12 19:29:28.769230 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:29:28.769237 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:29:28.769243 kernel: LSM: Security Framework initializing Feb 12 19:29:28.769249 kernel: SELinux: Initializing. Feb 12 19:29:28.769257 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:29:28.769263 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:29:28.769270 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:29:28.769276 kernel: Platform MSI: ITS@0x8080000 domain created Feb 12 19:29:28.769283 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 12 19:29:28.769289 kernel: Remapping and enabling EFI services. Feb 12 19:29:28.769295 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:29:28.769302 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:29:28.769308 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 12 19:29:28.769316 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 12 19:29:28.769322 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:29:28.769329 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:29:28.769335 kernel: Detected PIPT I-cache on CPU2 Feb 12 19:29:28.769341 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 12 19:29:28.769347 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 12 19:29:28.769354 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:29:28.769360 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 12 19:29:28.769366 kernel: Detected PIPT I-cache on CPU3 Feb 12 19:29:28.769373 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 12 19:29:28.769381 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 12 19:29:28.769387 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:29:28.769393 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 12 19:29:28.769400 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:29:28.769411 kernel: SMP: Total of 4 processors activated. Feb 12 19:29:28.769419 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:29:28.769426 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:29:28.769433 kernel: CPU features: detected: Common not Private translations Feb 12 19:29:28.769439 kernel: CPU features: detected: CRC32 instructions Feb 12 19:29:28.769446 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:29:28.769453 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:29:28.769459 kernel: CPU features: detected: Privileged Access Never Feb 12 19:29:28.769468 kernel: CPU features: detected: RAS Extension Support Feb 12 19:29:28.769475 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 12 19:29:28.769481 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:29:28.769488 kernel: alternatives: patching kernel code Feb 12 19:29:28.769497 kernel: devtmpfs: initialized Feb 12 19:29:28.769503 kernel: KASLR enabled Feb 12 19:29:28.769511 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:29:28.769517 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:29:28.769524 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:29:28.769531 kernel: SMBIOS 3.0.0 present. Feb 12 19:29:28.769538 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 12 19:29:28.769545 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:29:28.769552 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:29:28.769559 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:29:28.769567 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:29:28.769574 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:29:28.769580 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Feb 12 19:29:28.769587 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:29:28.769594 kernel: cpuidle: using governor menu Feb 12 19:29:28.769600 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:29:28.769607 kernel: ASID allocator initialised with 32768 entries Feb 12 19:29:28.769614 kernel: ACPI: bus type PCI registered Feb 12 19:29:28.769620 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:29:28.769629 kernel: Serial: AMBA PL011 UART driver Feb 12 19:29:28.769635 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:29:28.769642 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:29:28.769648 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:29:28.769655 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:29:28.769662 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:29:28.769669 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:29:28.769676 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:29:28.769683 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:29:28.769691 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:29:28.769697 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:29:28.769704 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:29:28.769711 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:29:28.769717 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:29:28.769724 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:29:28.769730 kernel: ACPI: Interpreter enabled Feb 12 19:29:28.769737 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:29:28.769744 kernel: ACPI: MCFG table detected, 1 entries Feb 12 19:29:28.769752 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:29:28.769758 kernel: printk: console [ttyAMA0] enabled Feb 12 19:29:28.769768 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:29:28.769963 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:29:28.770033 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 12 19:29:28.770094 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 12 19:29:28.770154 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 12 19:29:28.770217 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 12 19:29:28.770226 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 12 19:29:28.770233 kernel: PCI host bridge to bus 0000:00 Feb 12 19:29:28.770302 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 12 19:29:28.770382 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 12 19:29:28.770523 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 12 19:29:28.771108 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:29:28.771256 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 12 19:29:28.771332 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:29:28.771395 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 12 19:29:28.771461 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 12 19:29:28.771534 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:29:28.771596 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:29:28.771657 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 12 19:29:28.771722 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 12 19:29:28.771780 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 12 19:29:28.772527 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 12 19:29:28.772601 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 12 19:29:28.772611 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 12 19:29:28.772618 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 12 19:29:28.772626 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 12 19:29:28.772638 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 12 19:29:28.772645 kernel: iommu: Default domain type: Translated Feb 12 19:29:28.772652 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:29:28.772659 kernel: vgaarb: loaded Feb 12 19:29:28.772666 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:29:28.772674 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:29:28.772681 kernel: PTP clock support registered Feb 12 19:29:28.772688 kernel: Registered efivars operations Feb 12 19:29:28.772695 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:29:28.772704 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:29:28.772711 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:29:28.772718 kernel: pnp: PnP ACPI init Feb 12 19:29:28.772801 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 12 19:29:28.772813 kernel: pnp: PnP ACPI: found 1 devices Feb 12 19:29:28.772820 kernel: NET: Registered PF_INET protocol family Feb 12 19:29:28.772827 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:29:28.772834 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:29:28.772841 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:29:28.772850 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:29:28.772889 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:29:28.772897 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:29:28.772903 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:29:28.772910 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:29:28.772917 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:29:28.772923 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:29:28.772930 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 12 19:29:28.772939 kernel: kvm [1]: HYP mode not available Feb 12 19:29:28.772945 kernel: Initialise system trusted keyrings Feb 12 19:29:28.772952 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:29:28.772958 kernel: Key type asymmetric registered Feb 12 19:29:28.772965 kernel: Asymmetric key parser 'x509' registered Feb 12 19:29:28.772971 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:29:28.772978 kernel: io scheduler mq-deadline registered Feb 12 19:29:28.772985 kernel: io scheduler kyber registered Feb 12 19:29:28.772991 kernel: io scheduler bfq registered Feb 12 19:29:28.772998 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 12 19:29:28.773006 kernel: ACPI: button: Power Button [PWRB] Feb 12 19:29:28.773013 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 12 19:29:28.773090 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 12 19:29:28.773100 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:29:28.773106 kernel: thunder_xcv, ver 1.0 Feb 12 19:29:28.773113 kernel: thunder_bgx, ver 1.0 Feb 12 19:29:28.773119 kernel: nicpf, ver 1.0 Feb 12 19:29:28.773126 kernel: nicvf, ver 1.0 Feb 12 19:29:28.773269 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:29:28.773334 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:29:28 UTC (1707766168) Feb 12 19:29:28.773344 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:29:28.773354 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:29:28.773361 kernel: Segment Routing with IPv6 Feb 12 19:29:28.773368 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:29:28.773375 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:29:28.773382 kernel: Key type dns_resolver registered Feb 12 19:29:28.773389 kernel: registered taskstats version 1 Feb 12 19:29:28.773397 kernel: Loading compiled-in X.509 certificates Feb 12 19:29:28.773404 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:29:28.773411 kernel: Key type .fscrypt registered Feb 12 19:29:28.773418 kernel: Key type fscrypt-provisioning registered Feb 12 19:29:28.773425 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:29:28.773431 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:29:28.773438 kernel: ima: No architecture policies found Feb 12 19:29:28.773445 kernel: Freeing unused kernel memory: 34688K Feb 12 19:29:28.773452 kernel: Run /init as init process Feb 12 19:29:28.773459 kernel: with arguments: Feb 12 19:29:28.773466 kernel: /init Feb 12 19:29:28.773473 kernel: with environment: Feb 12 19:29:28.773479 kernel: HOME=/ Feb 12 19:29:28.773486 kernel: TERM=linux Feb 12 19:29:28.773493 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:29:28.773502 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:29:28.773511 systemd[1]: Detected virtualization kvm. Feb 12 19:29:28.773520 systemd[1]: Detected architecture arm64. Feb 12 19:29:28.773527 systemd[1]: Running in initrd. Feb 12 19:29:28.773534 systemd[1]: No hostname configured, using default hostname. Feb 12 19:29:28.773542 systemd[1]: Hostname set to . Feb 12 19:29:28.773549 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:29:28.773556 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:29:28.773564 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:29:28.773571 systemd[1]: Reached target cryptsetup.target. Feb 12 19:29:28.773580 systemd[1]: Reached target paths.target. Feb 12 19:29:28.773587 systemd[1]: Reached target slices.target. Feb 12 19:29:28.773594 systemd[1]: Reached target swap.target. Feb 12 19:29:28.773601 systemd[1]: Reached target timers.target. Feb 12 19:29:28.773609 systemd[1]: Listening on iscsid.socket. Feb 12 19:29:28.773616 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:29:28.773624 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:29:28.773633 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:29:28.773640 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:29:28.773647 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:29:28.773655 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:29:28.773662 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:29:28.773670 systemd[1]: Reached target sockets.target. Feb 12 19:29:28.773677 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:29:28.773685 systemd[1]: Finished network-cleanup.service. Feb 12 19:29:28.773692 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:29:28.773701 systemd[1]: Starting systemd-journald.service... Feb 12 19:29:28.773709 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:29:28.773716 systemd[1]: Starting systemd-resolved.service... Feb 12 19:29:28.773723 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:29:28.773731 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:29:28.773738 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:29:28.773746 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:29:28.773753 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:29:28.773760 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:29:28.773769 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:29:28.773777 kernel: audit: type=1130 audit(1707766168.764:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.773784 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:29:28.773804 systemd-journald[289]: Journal started Feb 12 19:29:28.773850 systemd-journald[289]: Runtime Journal (/run/log/journal/3450a445c0d3482bb67829066c6bc60a) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:29:28.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.754843 systemd-modules-load[290]: Inserted module 'overlay' Feb 12 19:29:28.776729 systemd[1]: Started systemd-journald.service. Feb 12 19:29:28.778350 kernel: audit: type=1130 audit(1707766168.778:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.780564 systemd-modules-load[290]: Inserted module 'br_netfilter' Feb 12 19:29:28.781675 kernel: Bridge firewalling registered Feb 12 19:29:28.783710 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:29:28.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.784242 systemd-resolved[291]: Positive Trust Anchors: Feb 12 19:29:28.788749 kernel: audit: type=1130 audit(1707766168.784:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.784251 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:29:28.784279 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:29:28.788298 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:29:28.798910 kernel: SCSI subsystem initialized Feb 12 19:29:28.791672 systemd-resolved[291]: Defaulting to hostname 'linux'. Feb 12 19:29:28.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.802887 kernel: audit: type=1130 audit(1707766168.799:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.797906 systemd[1]: Started systemd-resolved.service. Feb 12 19:29:28.804939 systemd[1]: Reached target nss-lookup.target. Feb 12 19:29:28.807892 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:29:28.807948 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:29:28.807958 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:29:28.808523 dracut-cmdline[306]: dracut-dracut-053 Feb 12 19:29:28.813120 dracut-cmdline[306]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:29:28.813344 systemd-modules-load[290]: Inserted module 'dm_multipath' Feb 12 19:29:28.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.814217 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:29:28.822628 kernel: audit: type=1130 audit(1707766168.818:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.820233 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:29:28.827754 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:29:28.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.831888 kernel: audit: type=1130 audit(1707766168.828:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.896878 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:29:28.908898 kernel: iscsi: registered transport (tcp) Feb 12 19:29:28.921877 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:29:28.921900 kernel: QLogic iSCSI HBA Driver Feb 12 19:29:28.962096 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:29:28.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:28.963738 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:29:28.966462 kernel: audit: type=1130 audit(1707766168.962:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:29.006890 kernel: raid6: neonx8 gen() 13813 MB/s Feb 12 19:29:29.023870 kernel: raid6: neonx8 xor() 10836 MB/s Feb 12 19:29:29.040868 kernel: raid6: neonx4 gen() 13579 MB/s Feb 12 19:29:29.057870 kernel: raid6: neonx4 xor() 11311 MB/s Feb 12 19:29:29.074887 kernel: raid6: neonx2 gen() 12919 MB/s Feb 12 19:29:29.091877 kernel: raid6: neonx2 xor() 10241 MB/s Feb 12 19:29:29.108875 kernel: raid6: neonx1 gen() 10480 MB/s Feb 12 19:29:29.125884 kernel: raid6: neonx1 xor() 8788 MB/s Feb 12 19:29:29.142872 kernel: raid6: int64x8 gen() 6294 MB/s Feb 12 19:29:29.159870 kernel: raid6: int64x8 xor() 3551 MB/s Feb 12 19:29:29.176871 kernel: raid6: int64x4 gen() 7262 MB/s Feb 12 19:29:29.193873 kernel: raid6: int64x4 xor() 3858 MB/s Feb 12 19:29:29.210871 kernel: raid6: int64x2 gen() 6156 MB/s Feb 12 19:29:29.227871 kernel: raid6: int64x2 xor() 3321 MB/s Feb 12 19:29:29.244895 kernel: raid6: int64x1 gen() 5044 MB/s Feb 12 19:29:29.262092 kernel: raid6: int64x1 xor() 2645 MB/s Feb 12 19:29:29.262105 kernel: raid6: using algorithm neonx8 gen() 13813 MB/s Feb 12 19:29:29.262114 kernel: raid6: .... xor() 10836 MB/s, rmw enabled Feb 12 19:29:29.262123 kernel: raid6: using neon recovery algorithm Feb 12 19:29:29.273161 kernel: xor: measuring software checksum speed Feb 12 19:29:29.273186 kernel: 8regs : 17293 MB/sec Feb 12 19:29:29.274001 kernel: 32regs : 20749 MB/sec Feb 12 19:29:29.275209 kernel: arm64_neon : 27873 MB/sec Feb 12 19:29:29.275221 kernel: xor: using function: arm64_neon (27873 MB/sec) Feb 12 19:29:29.330882 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:29:29.341931 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:29:29.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:29.344000 audit: BPF prog-id=7 op=LOAD Feb 12 19:29:29.346201 kernel: audit: type=1130 audit(1707766169.342:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:29.346222 kernel: audit: type=1334 audit(1707766169.344:10): prog-id=7 op=LOAD Feb 12 19:29:29.345000 audit: BPF prog-id=8 op=LOAD Feb 12 19:29:29.346731 systemd[1]: Starting systemd-udevd.service... Feb 12 19:29:29.362003 systemd-udevd[489]: Using default interface naming scheme 'v252'. Feb 12 19:29:29.366276 systemd[1]: Started systemd-udevd.service. Feb 12 19:29:29.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:29.368414 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:29:29.382669 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation Feb 12 19:29:29.411632 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:29:29.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:29.413305 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:29:29.447606 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:29:29.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:29.480864 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:29:29.492160 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:29:29.492202 kernel: GPT:9289727 != 19775487 Feb 12 19:29:29.492211 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:29:29.492220 kernel: GPT:9289727 != 19775487 Feb 12 19:29:29.492987 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:29:29.493893 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:29:29.505148 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:29:29.506262 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:29:29.511885 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (536) Feb 12 19:29:29.516271 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:29:29.519894 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:29:29.523271 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:29:29.525104 systemd[1]: Starting disk-uuid.service... Feb 12 19:29:29.531187 disk-uuid[559]: Primary Header is updated. Feb 12 19:29:29.531187 disk-uuid[559]: Secondary Entries is updated. Feb 12 19:29:29.531187 disk-uuid[559]: Secondary Header is updated. Feb 12 19:29:29.534873 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:29:30.545706 disk-uuid[560]: The operation has completed successfully. Feb 12 19:29:30.546956 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:29:30.572629 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:29:30.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.572719 systemd[1]: Finished disk-uuid.service. Feb 12 19:29:30.574550 systemd[1]: Starting verity-setup.service... Feb 12 19:29:30.593966 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:29:30.617704 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:29:30.619333 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:29:30.620136 systemd[1]: Finished verity-setup.service. Feb 12 19:29:30.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.665874 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:29:30.666113 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:29:30.667040 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:29:30.667782 systemd[1]: Starting ignition-setup.service... Feb 12 19:29:30.670852 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:29:30.677063 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:29:30.677104 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:29:30.677114 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:29:30.686490 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:29:30.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.694773 systemd[1]: Finished ignition-setup.service. Feb 12 19:29:30.696442 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:29:30.756549 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:29:30.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.757000 audit: BPF prog-id=9 op=LOAD Feb 12 19:29:30.758982 systemd[1]: Starting systemd-networkd.service... Feb 12 19:29:30.782129 ignition[652]: Ignition 2.14.0 Feb 12 19:29:30.782139 ignition[652]: Stage: fetch-offline Feb 12 19:29:30.782286 ignition[652]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:29:30.782296 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:29:30.782436 ignition[652]: parsed url from cmdline: "" Feb 12 19:29:30.782439 ignition[652]: no config URL provided Feb 12 19:29:30.782445 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:29:30.782452 ignition[652]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:29:30.782470 ignition[652]: op(1): [started] loading QEMU firmware config module Feb 12 19:29:30.782474 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:29:30.786252 ignition[652]: op(1): [finished] loading QEMU firmware config module Feb 12 19:29:30.795737 systemd-networkd[737]: lo: Link UP Feb 12 19:29:30.795748 systemd-networkd[737]: lo: Gained carrier Feb 12 19:29:30.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.796153 systemd-networkd[737]: Enumeration completed Feb 12 19:29:30.796324 systemd-networkd[737]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:29:30.796442 systemd[1]: Started systemd-networkd.service. Feb 12 19:29:30.797908 systemd-networkd[737]: eth0: Link UP Feb 12 19:29:30.797915 systemd-networkd[737]: eth0: Gained carrier Feb 12 19:29:30.798159 systemd[1]: Reached target network.target. Feb 12 19:29:30.799931 systemd[1]: Starting iscsiuio.service... Feb 12 19:29:30.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.810975 systemd[1]: Started iscsiuio.service. Feb 12 19:29:30.812611 systemd[1]: Starting iscsid.service... Feb 12 19:29:30.816579 iscsid[743]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:29:30.816579 iscsid[743]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:29:30.816579 iscsid[743]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:29:30.816579 iscsid[743]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:29:30.816579 iscsid[743]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:29:30.816579 iscsid[743]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:29:30.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.822422 systemd[1]: Started iscsid.service. Feb 12 19:29:30.824093 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:29:30.834653 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:29:30.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.835808 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:29:30.837192 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:29:30.838923 systemd[1]: Reached target remote-fs.target. Feb 12 19:29:30.841305 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:29:30.844942 systemd-networkd[737]: eth0: DHCPv4 address 10.0.0.116/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:29:30.851124 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:29:30.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.881931 ignition[652]: parsing config with SHA512: e4a26fea09e53c615b8120d533df2d64acca3f5f8a1082cb5cfb9f03786b209f57ae5a106327e56413af0147f72ae3bdeb21f8bb4a45189d953e925a6a993ec7 Feb 12 19:29:30.922784 unknown[652]: fetched base config from "system" Feb 12 19:29:30.923068 unknown[652]: fetched user config from "qemu" Feb 12 19:29:30.923922 ignition[652]: fetch-offline: fetch-offline passed Feb 12 19:29:30.924017 ignition[652]: Ignition finished successfully Feb 12 19:29:30.925236 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:29:30.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.926091 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:29:30.926934 systemd[1]: Starting ignition-kargs.service... Feb 12 19:29:30.936084 ignition[758]: Ignition 2.14.0 Feb 12 19:29:30.936094 ignition[758]: Stage: kargs Feb 12 19:29:30.936192 ignition[758]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:29:30.936201 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:29:30.937239 ignition[758]: kargs: kargs passed Feb 12 19:29:30.937287 ignition[758]: Ignition finished successfully Feb 12 19:29:30.940052 systemd[1]: Finished ignition-kargs.service. Feb 12 19:29:30.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.941848 systemd[1]: Starting ignition-disks.service... Feb 12 19:29:30.948668 ignition[764]: Ignition 2.14.0 Feb 12 19:29:30.948685 ignition[764]: Stage: disks Feb 12 19:29:30.948776 ignition[764]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:29:30.948795 ignition[764]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:29:30.951081 systemd[1]: Finished ignition-disks.service. Feb 12 19:29:30.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.949816 ignition[764]: disks: disks passed Feb 12 19:29:30.952370 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:29:30.949880 ignition[764]: Ignition finished successfully Feb 12 19:29:30.953336 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:29:30.954250 systemd[1]: Reached target local-fs.target. Feb 12 19:29:30.955295 systemd[1]: Reached target sysinit.target. Feb 12 19:29:30.956294 systemd[1]: Reached target basic.target. Feb 12 19:29:30.958205 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:29:30.969557 systemd-fsck[773]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:29:30.973671 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:29:30.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:30.976117 systemd[1]: Mounting sysroot.mount... Feb 12 19:29:30.981833 systemd[1]: Mounted sysroot.mount. Feb 12 19:29:30.982946 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:29:30.982618 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:29:30.984995 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:29:30.985962 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:29:30.986011 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:29:30.986037 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:29:30.987949 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:29:30.990507 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:29:30.994939 initrd-setup-root[783]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:29:31.001697 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:29:31.004891 initrd-setup-root[799]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:29:31.008827 initrd-setup-root[807]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:29:31.039876 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:29:31.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:31.041634 systemd[1]: Starting ignition-mount.service... Feb 12 19:29:31.043153 systemd[1]: Starting sysroot-boot.service... Feb 12 19:29:31.049170 bash[825]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:29:31.059434 ignition[826]: INFO : Ignition 2.14.0 Feb 12 19:29:31.059434 ignition[826]: INFO : Stage: mount Feb 12 19:29:31.060754 ignition[826]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:29:31.060754 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:29:31.063031 ignition[826]: INFO : mount: mount passed Feb 12 19:29:31.063031 ignition[826]: INFO : Ignition finished successfully Feb 12 19:29:31.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:31.063163 systemd[1]: Finished ignition-mount.service. Feb 12 19:29:31.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:31.064741 systemd[1]: Finished sysroot-boot.service. Feb 12 19:29:31.627440 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:29:31.635377 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) Feb 12 19:29:31.635420 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:29:31.635430 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:29:31.635957 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:29:31.639574 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:29:31.641266 systemd[1]: Starting ignition-files.service... Feb 12 19:29:31.655938 ignition[855]: INFO : Ignition 2.14.0 Feb 12 19:29:31.655938 ignition[855]: INFO : Stage: files Feb 12 19:29:31.657274 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:29:31.657274 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:29:31.657274 ignition[855]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:29:31.660047 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:29:31.660047 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:29:31.666810 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:29:31.668107 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:29:31.669631 unknown[855]: wrote ssh authorized keys file for user: core Feb 12 19:29:31.671611 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:29:31.671611 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:29:31.671611 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:29:31.910020 systemd-networkd[737]: eth0: Gained IPv6LL Feb 12 19:29:32.033193 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:29:32.273231 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:29:32.275444 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:29:32.275444 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:29:32.275444 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:29:32.505691 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:29:32.634609 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:29:32.634609 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:29:32.638431 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:29:32.638431 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 19:29:32.689400 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:29:32.727238 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:29:32.728901 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:29:32.730120 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:29:32.788468 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:29:33.049082 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 12 19:29:33.049082 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:29:33.049082 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:29:33.049082 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:29:33.073264 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:29:33.948119 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 12 19:29:33.951062 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:29:33.951062 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:29:33.951062 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 12 19:29:33.972053 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:29:34.239135 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:29:34.242275 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:29:34.242275 ignition[855]: INFO : files: op(f): [started] processing unit "coreos-metadata.service" Feb 12 19:29:34.242275 ignition[855]: INFO : files: op(f): op(10): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:29:34.242275 ignition[855]: INFO : files: op(f): op(10): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:29:34.242275 ignition[855]: INFO : files: op(f): [finished] processing unit "coreos-metadata.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:29:34.271981 ignition[855]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:29:34.302691 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:29:34.302720 kernel: audit: type=1130 audit(1707766174.284:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.302733 kernel: audit: type=1130 audit(1707766174.293:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.302743 kernel: audit: type=1130 audit(1707766174.297:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.302752 kernel: audit: type=1131 audit(1707766174.297:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.283917 systemd[1]: Finished ignition-files.service. Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:29:34.304080 ignition[855]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:29:34.304080 ignition[855]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:29:34.304080 ignition[855]: INFO : files: files passed Feb 12 19:29:34.304080 ignition[855]: INFO : Ignition finished successfully Feb 12 19:29:34.286617 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:29:34.289619 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:29:34.323074 kernel: audit: type=1130 audit(1707766174.317:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.323097 kernel: audit: type=1131 audit(1707766174.317:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.323167 initrd-setup-root-after-ignition[878]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:29:34.290284 systemd[1]: Starting ignition-quench.service... Feb 12 19:29:34.326065 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:29:34.293222 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:29:34.294813 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:29:34.294900 systemd[1]: Finished ignition-quench.service. Feb 12 19:29:34.298282 systemd[1]: Reached target ignition-complete.target. Feb 12 19:29:34.304245 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:29:34.317415 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:29:34.317508 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:29:34.318502 systemd[1]: Reached target initrd-fs.target. Feb 12 19:29:34.323739 systemd[1]: Reached target initrd.target. Feb 12 19:29:34.325433 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:29:34.326338 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:29:34.337357 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:29:34.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.339121 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:29:34.341663 kernel: audit: type=1130 audit(1707766174.338:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.347530 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:29:34.348466 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:29:34.349801 systemd[1]: Stopped target timers.target. Feb 12 19:29:34.351005 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:29:34.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.351120 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:29:34.355553 kernel: audit: type=1131 audit(1707766174.352:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.352283 systemd[1]: Stopped target initrd.target. Feb 12 19:29:34.355202 systemd[1]: Stopped target basic.target. Feb 12 19:29:34.356321 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:29:34.357553 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:29:34.358733 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:29:34.360024 systemd[1]: Stopped target remote-fs.target. Feb 12 19:29:34.361195 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:29:34.362433 systemd[1]: Stopped target sysinit.target. Feb 12 19:29:34.363564 systemd[1]: Stopped target local-fs.target. Feb 12 19:29:34.364683 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:29:34.365811 systemd[1]: Stopped target swap.target. Feb 12 19:29:34.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.366895 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:29:34.371573 kernel: audit: type=1131 audit(1707766174.368:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.367018 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:29:34.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.368302 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:29:34.375625 kernel: audit: type=1131 audit(1707766174.372:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.371083 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:29:34.371181 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:29:34.372426 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:29:34.372516 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:29:34.375339 systemd[1]: Stopped target paths.target. Feb 12 19:29:34.376366 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:29:34.379891 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:29:34.381358 systemd[1]: Stopped target slices.target. Feb 12 19:29:34.382147 systemd[1]: Stopped target sockets.target. Feb 12 19:29:34.383234 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:29:34.383302 systemd[1]: Closed iscsid.socket. Feb 12 19:29:34.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.384285 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:29:34.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.384380 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:29:34.385648 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:29:34.385734 systemd[1]: Stopped ignition-files.service. Feb 12 19:29:34.387536 systemd[1]: Stopping ignition-mount.service... Feb 12 19:29:34.389253 systemd[1]: Stopping iscsiuio.service... Feb 12 19:29:34.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.390280 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:29:34.390394 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:29:34.392483 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:29:34.393426 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:29:34.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.393558 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:29:34.394825 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:29:34.394933 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:29:34.397418 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:29:34.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.400888 ignition[895]: INFO : Ignition 2.14.0 Feb 12 19:29:34.400888 ignition[895]: INFO : Stage: umount Feb 12 19:29:34.400888 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:29:34.400888 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:29:34.397529 systemd[1]: Stopped iscsiuio.service. Feb 12 19:29:34.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.407059 ignition[895]: INFO : umount: umount passed Feb 12 19:29:34.407059 ignition[895]: INFO : Ignition finished successfully Feb 12 19:29:34.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.399220 systemd[1]: Stopped target network.target. Feb 12 19:29:34.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.400333 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:29:34.400406 systemd[1]: Closed iscsiuio.socket. Feb 12 19:29:34.401760 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:29:34.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.402925 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:29:34.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.405029 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:29:34.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.405538 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:29:34.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.405622 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:29:34.406783 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:29:34.406869 systemd[1]: Stopped ignition-mount.service. Feb 12 19:29:34.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.407042 systemd-networkd[737]: eth0: DHCPv6 lease lost Feb 12 19:29:34.418000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:29:34.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.407943 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:29:34.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.408015 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:29:34.409081 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:29:34.409160 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:29:34.411293 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:29:34.411320 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:29:34.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.412038 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:29:34.412078 systemd[1]: Stopped ignition-disks.service. Feb 12 19:29:34.412929 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:29:34.427000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:29:34.412963 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:29:34.414029 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:29:34.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.414062 systemd[1]: Stopped ignition-setup.service. Feb 12 19:29:34.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.414993 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:29:34.415025 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:29:34.416745 systemd[1]: Stopping network-cleanup.service... Feb 12 19:29:34.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.417691 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:29:34.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.417743 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:29:34.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.419064 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:29:34.419104 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:29:34.420451 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:29:34.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.420486 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:29:34.421479 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:29:34.424622 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:29:34.425623 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:29:34.425716 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:29:34.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:34.430202 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:29:34.430323 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:29:34.431646 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:29:34.431727 systemd[1]: Stopped network-cleanup.service. Feb 12 19:29:34.432702 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:29:34.432734 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:29:34.433794 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:29:34.433828 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:29:34.435110 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:29:34.435150 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:29:34.436290 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:29:34.436330 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:29:34.437528 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:29:34.437566 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:29:34.439824 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:29:34.441256 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:29:34.441315 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:29:34.445781 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:29:34.445883 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:29:34.447072 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:29:34.448901 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:29:34.455532 systemd[1]: Switching root. Feb 12 19:29:34.469149 iscsid[743]: iscsid shutting down. Feb 12 19:29:34.469658 systemd-journald[289]: Journal stopped Feb 12 19:29:36.595743 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Feb 12 19:29:36.595803 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:29:36.595819 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:29:36.595829 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:29:36.595841 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:29:36.595850 kernel: SELinux: policy capability open_perms=1 Feb 12 19:29:36.595886 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:29:36.595901 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:29:36.595911 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:29:36.595921 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:29:36.595941 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:29:36.595954 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:29:36.595965 systemd[1]: Successfully loaded SELinux policy in 30.923ms. Feb 12 19:29:36.595979 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.197ms. Feb 12 19:29:36.595991 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:29:36.596002 systemd[1]: Detected virtualization kvm. Feb 12 19:29:36.596012 systemd[1]: Detected architecture arm64. Feb 12 19:29:36.596022 systemd[1]: Detected first boot. Feb 12 19:29:36.596032 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:29:36.596044 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:29:36.596054 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:29:36.596065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:29:36.596076 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:29:36.596087 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:29:36.596098 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:29:36.596109 systemd[1]: Stopped iscsid.service. Feb 12 19:29:36.596120 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:29:36.596130 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:29:36.596140 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:29:36.596151 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:29:36.596161 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:29:36.596171 systemd[1]: Created slice system-getty.slice. Feb 12 19:29:36.596182 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:29:36.596192 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:29:36.596204 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:29:36.596215 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:29:36.596225 systemd[1]: Created slice user.slice. Feb 12 19:29:36.596235 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:29:36.596245 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:29:36.596256 systemd[1]: Set up automount boot.automount. Feb 12 19:29:36.596266 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:29:36.596277 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:29:36.596288 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:29:36.596299 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:29:36.596309 systemd[1]: Reached target integritysetup.target. Feb 12 19:29:36.596319 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:29:36.596333 systemd[1]: Reached target remote-fs.target. Feb 12 19:29:36.596344 systemd[1]: Reached target slices.target. Feb 12 19:29:36.596354 systemd[1]: Reached target swap.target. Feb 12 19:29:36.596364 systemd[1]: Reached target torcx.target. Feb 12 19:29:36.596375 systemd[1]: Reached target veritysetup.target. Feb 12 19:29:36.596387 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:29:36.596398 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:29:36.596408 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:29:36.596418 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:29:36.596430 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:29:36.596440 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:29:36.596451 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:29:36.596461 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:29:36.596471 systemd[1]: Mounting media.mount... Feb 12 19:29:36.596481 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:29:36.596493 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:29:36.596503 systemd[1]: Mounting tmp.mount... Feb 12 19:29:36.596513 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:29:36.596524 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:29:36.596534 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:29:36.596544 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:29:36.596555 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:29:36.596565 systemd[1]: Starting modprobe@drm.service... Feb 12 19:29:36.596575 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:29:36.596587 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:29:36.596597 systemd[1]: Starting modprobe@loop.service... Feb 12 19:29:36.596608 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:29:36.596619 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:29:36.596629 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:29:36.596639 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:29:36.596652 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:29:36.596662 systemd[1]: Stopped systemd-journald.service. Feb 12 19:29:36.596672 kernel: fuse: init (API version 7.34) Feb 12 19:29:36.596682 kernel: loop: module loaded Feb 12 19:29:36.596694 systemd[1]: Starting systemd-journald.service... Feb 12 19:29:36.596706 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:29:36.596716 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:29:36.596727 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:29:36.596737 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:29:36.596747 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:29:36.596757 systemd[1]: Stopped verity-setup.service. Feb 12 19:29:36.596772 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:29:36.596783 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:29:36.596793 systemd[1]: Mounted media.mount. Feb 12 19:29:36.596807 systemd-journald[991]: Journal started Feb 12 19:29:36.596850 systemd-journald[991]: Runtime Journal (/run/log/journal/3450a445c0d3482bb67829066c6bc60a) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:29:36.596893 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:29:34.531000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:29:34.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:29:34.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:29:34.728000 audit: BPF prog-id=10 op=LOAD Feb 12 19:29:34.728000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:29:34.728000 audit: BPF prog-id=11 op=LOAD Feb 12 19:29:34.728000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:29:34.776000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:29:34.776000 audit[929]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001fb8dc a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:34.776000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:29:34.777000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:29:34.777000 audit[929]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001fb9b5 a2=1ed a3=0 items=2 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:34.777000 audit: CWD cwd="/" Feb 12 19:29:34.777000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:29:34.777000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:29:34.777000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:29:36.468000 audit: BPF prog-id=12 op=LOAD Feb 12 19:29:36.468000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:29:36.469000 audit: BPF prog-id=13 op=LOAD Feb 12 19:29:36.469000 audit: BPF prog-id=14 op=LOAD Feb 12 19:29:36.469000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:29:36.469000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:29:36.469000 audit: BPF prog-id=15 op=LOAD Feb 12 19:29:36.470000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:29:36.470000 audit: BPF prog-id=16 op=LOAD Feb 12 19:29:36.470000 audit: BPF prog-id=17 op=LOAD Feb 12 19:29:36.470000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:29:36.470000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:29:36.471000 audit: BPF prog-id=18 op=LOAD Feb 12 19:29:36.471000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:29:36.471000 audit: BPF prog-id=19 op=LOAD Feb 12 19:29:36.471000 audit: BPF prog-id=20 op=LOAD Feb 12 19:29:36.471000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:29:36.471000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:29:36.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.481000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:29:36.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.567000 audit: BPF prog-id=21 op=LOAD Feb 12 19:29:36.572000 audit: BPF prog-id=22 op=LOAD Feb 12 19:29:36.573000 audit: BPF prog-id=23 op=LOAD Feb 12 19:29:36.573000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:29:36.573000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:29:36.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.593000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:29:36.593000 audit[991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffdc83c8e0 a2=4000 a3=1 items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:36.593000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:29:34.775316 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:29:36.468483 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:29:34.775599 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:29:36.468494 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:29:34.775619 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:29:36.472327 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:29:34.775649 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:29:34.775659 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:29:34.775684 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:29:34.775696 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:29:34.775907 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:29:34.775942 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:29:34.775954 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:29:34.776424 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:29:34.776456 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:29:34.776474 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:29:34.776701 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:29:34.776722 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:29:36.599373 systemd[1]: Started systemd-journald.service. Feb 12 19:29:34.776735 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:29:36.201729 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:29:36.202017 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:29:36.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.202120 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:29:36.202276 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:29:36.202328 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:29:36.202385 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-02-12T19:29:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:29:36.600056 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:29:36.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.601017 systemd[1]: Mounted tmp.mount. Feb 12 19:29:36.601971 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:29:36.603045 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:29:36.603215 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:29:36.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.604322 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:29:36.604481 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:29:36.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.605643 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:29:36.605811 systemd[1]: Finished modprobe@drm.service. Feb 12 19:29:36.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.606829 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:29:36.606999 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:29:36.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.608141 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:29:36.608289 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:29:36.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.609363 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:29:36.609519 systemd[1]: Finished modprobe@loop.service. Feb 12 19:29:36.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.610602 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:29:36.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.611885 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:29:36.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.613055 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:29:36.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.614352 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:29:36.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.615673 systemd[1]: Reached target network-pre.target. Feb 12 19:29:36.617808 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:29:36.619630 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:29:36.620374 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:29:36.624847 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:29:36.626795 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:29:36.628016 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:29:36.629109 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:29:36.630159 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:29:36.631314 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:29:36.633996 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:29:36.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.637318 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:29:36.638474 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:29:36.639453 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:29:36.640647 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:29:36.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.641712 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:29:36.643937 systemd-journald[991]: Time spent on flushing to /var/log/journal/3450a445c0d3482bb67829066c6bc60a is 15.240ms for 1035 entries. Feb 12 19:29:36.643937 systemd-journald[991]: System Journal (/var/log/journal/3450a445c0d3482bb67829066c6bc60a) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:29:36.669230 systemd-journald[991]: Received client request to flush runtime journal. Feb 12 19:29:36.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.643745 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:29:36.654642 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:29:36.670527 udevadm[1029]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:29:36.663918 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:29:36.670223 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:29:36.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.996949 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:29:36.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:36.998000 audit: BPF prog-id=24 op=LOAD Feb 12 19:29:36.999000 audit: BPF prog-id=25 op=LOAD Feb 12 19:29:36.999000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:29:36.999000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:29:37.000492 systemd[1]: Starting systemd-udevd.service... Feb 12 19:29:37.028120 systemd-udevd[1032]: Using default interface naming scheme 'v252'. Feb 12 19:29:37.055068 systemd[1]: Started systemd-udevd.service. Feb 12 19:29:37.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.055000 audit: BPF prog-id=26 op=LOAD Feb 12 19:29:37.059067 systemd[1]: Starting systemd-networkd.service... Feb 12 19:29:37.076000 audit: BPF prog-id=27 op=LOAD Feb 12 19:29:37.076000 audit: BPF prog-id=28 op=LOAD Feb 12 19:29:37.076000 audit: BPF prog-id=29 op=LOAD Feb 12 19:29:37.078295 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:29:37.081285 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:29:37.108803 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:29:37.120702 systemd[1]: Started systemd-userdbd.service. Feb 12 19:29:37.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.158404 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:29:37.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.160435 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:29:37.173326 systemd-networkd[1040]: lo: Link UP Feb 12 19:29:37.173690 systemd-networkd[1040]: lo: Gained carrier Feb 12 19:29:37.176008 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:29:37.176424 systemd-networkd[1040]: Enumeration completed Feb 12 19:29:37.176604 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:29:37.176614 systemd[1]: Started systemd-networkd.service. Feb 12 19:29:37.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.177996 systemd-networkd[1040]: eth0: Link UP Feb 12 19:29:37.178065 systemd-networkd[1040]: eth0: Gained carrier Feb 12 19:29:37.203714 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:29:37.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.204539 systemd[1]: Reached target cryptsetup.target. Feb 12 19:29:37.206295 systemd[1]: Starting lvm2-activation.service... Feb 12 19:29:37.206990 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.116/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:29:37.209954 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:29:37.232702 systemd[1]: Finished lvm2-activation.service. Feb 12 19:29:37.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.233518 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:29:37.234209 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:29:37.234239 systemd[1]: Reached target local-fs.target. Feb 12 19:29:37.234812 systemd[1]: Reached target machines.target. Feb 12 19:29:37.236698 systemd[1]: Starting ldconfig.service... Feb 12 19:29:37.238795 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:29:37.238850 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:29:37.240028 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:29:37.241785 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:29:37.244602 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:29:37.246190 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:29:37.246254 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:29:37.247355 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:29:37.251028 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) Feb 12 19:29:37.252724 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:29:37.255843 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:29:37.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.272456 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:29:37.279510 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:29:37.283538 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:29:37.393159 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:29:37.393778 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:29:37.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.399419 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) Feb 12 19:29:37.399419 systemd-fsck[1077]: /dev/vda1: 236 files, 113719/258078 clusters Feb 12 19:29:37.401430 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:29:37.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.404541 systemd[1]: Mounting boot.mount... Feb 12 19:29:37.414216 systemd[1]: Mounted boot.mount. Feb 12 19:29:37.422595 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:29:37.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.509661 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:29:37.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.512020 systemd[1]: Starting audit-rules.service... Feb 12 19:29:37.513783 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:29:37.515718 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:29:37.517000 audit: BPF prog-id=30 op=LOAD Feb 12 19:29:37.519335 systemd[1]: Starting systemd-resolved.service... Feb 12 19:29:37.523000 audit: BPF prog-id=31 op=LOAD Feb 12 19:29:37.525100 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:29:37.526747 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:29:37.528119 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:29:37.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.531423 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:29:37.542000 audit[1087]: SYSTEM_BOOT pid=1087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.544466 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:29:37.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.545841 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:29:37.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.550409 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:29:37.555382 systemd[1]: Finished ldconfig.service. Feb 12 19:29:37.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.557519 systemd[1]: Starting systemd-update-done.service... Feb 12 19:29:37.564780 systemd[1]: Finished systemd-update-done.service. Feb 12 19:29:37.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.580343 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:29:37.581089 systemd-timesyncd[1086]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:29:37.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:37.581145 systemd-timesyncd[1086]: Initial clock synchronization to Mon 2024-02-12 19:29:37.281519 UTC. Feb 12 19:29:37.581352 systemd-resolved[1085]: Positive Trust Anchors: Feb 12 19:29:37.581358 systemd-resolved[1085]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:29:37.581385 systemd-resolved[1085]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:29:37.581442 systemd[1]: Reached target time-set.target. Feb 12 19:29:37.587000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:29:37.587000 audit[1103]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeee55fe0 a2=420 a3=0 items=0 ppid=1081 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:37.587000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:29:37.588534 augenrules[1103]: No rules Feb 12 19:29:37.589548 systemd[1]: Finished audit-rules.service. Feb 12 19:29:37.594326 systemd-resolved[1085]: Defaulting to hostname 'linux'. Feb 12 19:29:37.595758 systemd[1]: Started systemd-resolved.service. Feb 12 19:29:37.596717 systemd[1]: Reached target network.target. Feb 12 19:29:37.597331 systemd[1]: Reached target nss-lookup.target. Feb 12 19:29:37.597910 systemd[1]: Reached target sysinit.target. Feb 12 19:29:37.598515 systemd[1]: Started motdgen.path. Feb 12 19:29:37.599388 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:29:37.600364 systemd[1]: Started logrotate.timer. Feb 12 19:29:37.601310 systemd[1]: Started mdadm.timer. Feb 12 19:29:37.602022 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:29:37.602878 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:29:37.602922 systemd[1]: Reached target paths.target. Feb 12 19:29:37.603724 systemd[1]: Reached target timers.target. Feb 12 19:29:37.605115 systemd[1]: Listening on dbus.socket. Feb 12 19:29:37.606981 systemd[1]: Starting docker.socket... Feb 12 19:29:37.610606 systemd[1]: Listening on sshd.socket. Feb 12 19:29:37.611516 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:29:37.611979 systemd[1]: Listening on docker.socket. Feb 12 19:29:37.612809 systemd[1]: Reached target sockets.target. Feb 12 19:29:37.613589 systemd[1]: Reached target basic.target. Feb 12 19:29:37.614378 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:29:37.614407 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:29:37.615426 systemd[1]: Starting containerd.service... Feb 12 19:29:37.617137 systemd[1]: Starting dbus.service... Feb 12 19:29:37.618827 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:29:37.620744 systemd[1]: Starting extend-filesystems.service... Feb 12 19:29:37.621684 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:29:37.622981 systemd[1]: Starting motdgen.service... Feb 12 19:29:37.624838 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:29:37.627142 systemd[1]: Starting prepare-critools.service... Feb 12 19:29:37.630003 systemd[1]: Starting prepare-helm.service... Feb 12 19:29:37.630607 jq[1112]: false Feb 12 19:29:37.632336 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:29:37.634356 systemd[1]: Starting sshd-keygen.service... Feb 12 19:29:37.637416 extend-filesystems[1113]: Found vda Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda1 Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda2 Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda3 Feb 12 19:29:37.639043 extend-filesystems[1113]: Found usr Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda4 Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda6 Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda7 Feb 12 19:29:37.639043 extend-filesystems[1113]: Found vda9 Feb 12 19:29:37.639043 extend-filesystems[1113]: Checking size of /dev/vda9 Feb 12 19:29:37.638435 systemd[1]: Starting systemd-logind.service... Feb 12 19:29:37.642247 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:29:37.651098 jq[1133]: true Feb 12 19:29:37.642306 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:29:37.642786 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:29:37.643556 systemd[1]: Starting update-engine.service... Feb 12 19:29:37.645711 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:29:37.648562 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:29:37.648735 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:29:37.651142 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:29:37.651317 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:29:37.657965 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:29:37.658198 systemd[1]: Finished motdgen.service. Feb 12 19:29:37.663465 jq[1140]: true Feb 12 19:29:37.671240 dbus-daemon[1111]: [system] SELinux support is enabled Feb 12 19:29:37.680005 tar[1137]: ./ Feb 12 19:29:37.680005 tar[1137]: ./loopback Feb 12 19:29:37.680167 extend-filesystems[1113]: Resized partition /dev/vda9 Feb 12 19:29:37.681057 tar[1139]: linux-arm64/helm Feb 12 19:29:37.671413 systemd[1]: Started dbus.service. Feb 12 19:29:37.675646 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:29:37.675666 systemd[1]: Reached target system-config.target. Feb 12 19:29:37.676676 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:29:37.676693 systemd[1]: Reached target user-config.target. Feb 12 19:29:37.688599 extend-filesystems[1150]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:29:37.690026 tar[1138]: crictl Feb 12 19:29:37.701752 systemd-logind[1125]: Watching system buttons on /dev/input/event0 (Power Button) Feb 12 19:29:37.705617 systemd-logind[1125]: New seat seat0. Feb 12 19:29:37.709624 systemd[1]: Started systemd-logind.service. Feb 12 19:29:37.723065 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:29:37.721585 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:29:37.723214 bash[1163]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:29:37.729889 tar[1137]: ./bandwidth Feb 12 19:29:37.743296 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:29:37.755403 extend-filesystems[1150]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:29:37.755403 extend-filesystems[1150]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:29:37.755403 extend-filesystems[1150]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:29:37.759021 extend-filesystems[1113]: Resized filesystem in /dev/vda9 Feb 12 19:29:37.762435 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:29:37.762610 systemd[1]: Finished extend-filesystems.service. Feb 12 19:29:37.777263 update_engine[1131]: I0212 19:29:37.777001 1131 main.cc:92] Flatcar Update Engine starting Feb 12 19:29:37.779937 systemd[1]: Started update-engine.service. Feb 12 19:29:37.782481 systemd[1]: Started locksmithd.service. Feb 12 19:29:37.783994 update_engine[1131]: I0212 19:29:37.783969 1131 update_check_scheduler.cc:74] Next update check in 2m4s Feb 12 19:29:37.788227 tar[1137]: ./ptp Feb 12 19:29:37.824953 tar[1137]: ./vlan Feb 12 19:29:37.864201 tar[1137]: ./host-device Feb 12 19:29:37.893172 tar[1137]: ./tuning Feb 12 19:29:37.911621 env[1141]: time="2024-02-12T19:29:37.910756520Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:29:37.923536 tar[1137]: ./vrf Feb 12 19:29:37.953929 tar[1137]: ./sbr Feb 12 19:29:37.973039 env[1141]: time="2024-02-12T19:29:37.972981960Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:29:37.973189 env[1141]: time="2024-02-12T19:29:37.973167000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:29:37.975771 env[1141]: time="2024-02-12T19:29:37.975727280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:29:37.975808 env[1141]: time="2024-02-12T19:29:37.975776520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976056 env[1141]: time="2024-02-12T19:29:37.976029920Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976100 env[1141]: time="2024-02-12T19:29:37.976057080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976100 env[1141]: time="2024-02-12T19:29:37.976071160Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:29:37.976100 env[1141]: time="2024-02-12T19:29:37.976080400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976193 env[1141]: time="2024-02-12T19:29:37.976164200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976475 env[1141]: time="2024-02-12T19:29:37.976453320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976591 env[1141]: time="2024-02-12T19:29:37.976571000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:29:37.976619 env[1141]: time="2024-02-12T19:29:37.976591800Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:29:37.976664 env[1141]: time="2024-02-12T19:29:37.976646640Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:29:37.976695 env[1141]: time="2024-02-12T19:29:37.976664120Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:29:37.983289 env[1141]: time="2024-02-12T19:29:37.983260520Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:29:37.983342 env[1141]: time="2024-02-12T19:29:37.983294040Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:29:37.983342 env[1141]: time="2024-02-12T19:29:37.983308200Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:29:37.983388 env[1141]: time="2024-02-12T19:29:37.983340960Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983388 env[1141]: time="2024-02-12T19:29:37.983357400Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983388 env[1141]: time="2024-02-12T19:29:37.983371240Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983388 env[1141]: time="2024-02-12T19:29:37.983382840Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983737 env[1141]: time="2024-02-12T19:29:37.983715880Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983773 env[1141]: time="2024-02-12T19:29:37.983739120Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983773 env[1141]: time="2024-02-12T19:29:37.983758840Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983821 env[1141]: time="2024-02-12T19:29:37.983786000Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.983821 env[1141]: time="2024-02-12T19:29:37.983801440Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:29:37.984022 env[1141]: time="2024-02-12T19:29:37.984001400Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:29:37.984109 env[1141]: time="2024-02-12T19:29:37.984092920Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:29:37.984273 tar[1137]: ./tap Feb 12 19:29:37.984329 env[1141]: time="2024-02-12T19:29:37.984311640Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:29:37.984361 env[1141]: time="2024-02-12T19:29:37.984340040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984361 env[1141]: time="2024-02-12T19:29:37.984353600Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:29:37.984469 env[1141]: time="2024-02-12T19:29:37.984455000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984497 env[1141]: time="2024-02-12T19:29:37.984470720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984497 env[1141]: time="2024-02-12T19:29:37.984482840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984539 env[1141]: time="2024-02-12T19:29:37.984506320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984539 env[1141]: time="2024-02-12T19:29:37.984519360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984539 env[1141]: time="2024-02-12T19:29:37.984531680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984593 env[1141]: time="2024-02-12T19:29:37.984543160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984593 env[1141]: time="2024-02-12T19:29:37.984554880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984593 env[1141]: time="2024-02-12T19:29:37.984567880Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:29:37.984701 env[1141]: time="2024-02-12T19:29:37.984683400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984730 env[1141]: time="2024-02-12T19:29:37.984704320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984730 env[1141]: time="2024-02-12T19:29:37.984716400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.984905 env[1141]: time="2024-02-12T19:29:37.984728000Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:29:37.984905 env[1141]: time="2024-02-12T19:29:37.984742880Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:29:37.984905 env[1141]: time="2024-02-12T19:29:37.984753640Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:29:37.984905 env[1141]: time="2024-02-12T19:29:37.984783480Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:29:37.984905 env[1141]: time="2024-02-12T19:29:37.984821360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:29:37.985113 env[1141]: time="2024-02-12T19:29:37.985057160Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.985119200Z" level=info msg="Connect containerd service" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.985154000Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.985735080Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.986111360Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.986150240Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.986199520Z" level=info msg="containerd successfully booted in 0.076628s" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.987926240Z" level=info msg="Start subscribing containerd event" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.987973200Z" level=info msg="Start recovering state" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.988035440Z" level=info msg="Start event monitor" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.988055160Z" level=info msg="Start snapshots syncer" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.988065960Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:29:37.988706 env[1141]: time="2024-02-12T19:29:37.988073480Z" level=info msg="Start streaming server" Feb 12 19:29:37.987632 systemd[1]: Started containerd.service. Feb 12 19:29:38.018393 tar[1137]: ./dhcp Feb 12 19:29:38.098521 tar[1137]: ./static Feb 12 19:29:38.108945 tar[1139]: linux-arm64/LICENSE Feb 12 19:29:38.109053 tar[1139]: linux-arm64/README.md Feb 12 19:29:38.114767 systemd[1]: Finished prepare-helm.service. Feb 12 19:29:38.124997 tar[1137]: ./firewall Feb 12 19:29:38.131928 locksmithd[1169]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:29:38.161549 tar[1137]: ./macvlan Feb 12 19:29:38.194101 tar[1137]: ./dummy Feb 12 19:29:38.226086 tar[1137]: ./bridge Feb 12 19:29:38.236972 systemd[1]: Finished prepare-critools.service. Feb 12 19:29:38.261471 tar[1137]: ./ipvlan Feb 12 19:29:38.293183 tar[1137]: ./portmap Feb 12 19:29:38.323460 tar[1137]: ./host-local Feb 12 19:29:38.358955 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:29:38.438032 systemd-networkd[1040]: eth0: Gained IPv6LL Feb 12 19:29:39.912710 sshd_keygen[1134]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:29:39.929842 systemd[1]: Finished sshd-keygen.service. Feb 12 19:29:39.932219 systemd[1]: Starting issuegen.service... Feb 12 19:29:39.936646 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:29:39.936804 systemd[1]: Finished issuegen.service. Feb 12 19:29:39.939254 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:29:39.945442 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:29:39.947848 systemd[1]: Started getty@tty1.service. Feb 12 19:29:39.950013 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:29:39.951033 systemd[1]: Reached target getty.target. Feb 12 19:29:39.951863 systemd[1]: Reached target multi-user.target. Feb 12 19:29:39.954033 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:29:39.960548 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:29:39.960712 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:29:39.961773 systemd[1]: Startup finished in 608ms (kernel) + 5.909s (initrd) + 5.468s (userspace) = 11.986s. Feb 12 19:29:41.315684 systemd[1]: Created slice system-sshd.slice. Feb 12 19:29:41.316724 systemd[1]: Started sshd@0-10.0.0.116:22-10.0.0.1:40508.service. Feb 12 19:29:41.368925 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 40508 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:41.370553 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:41.380557 systemd[1]: Created slice user-500.slice. Feb 12 19:29:41.381700 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:29:41.383332 systemd-logind[1125]: New session 1 of user core. Feb 12 19:29:41.389576 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:29:41.390970 systemd[1]: Starting user@500.service... Feb 12 19:29:41.393637 (systemd)[1202]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:41.456401 systemd[1202]: Queued start job for default target default.target. Feb 12 19:29:41.457180 systemd[1202]: Reached target paths.target. Feb 12 19:29:41.457292 systemd[1202]: Reached target sockets.target. Feb 12 19:29:41.457455 systemd[1202]: Reached target timers.target. Feb 12 19:29:41.457544 systemd[1202]: Reached target basic.target. Feb 12 19:29:41.457708 systemd[1]: Started user@500.service. Feb 12 19:29:41.458595 systemd[1]: Started session-1.scope. Feb 12 19:29:41.458970 systemd[1202]: Reached target default.target. Feb 12 19:29:41.459017 systemd[1202]: Startup finished in 59ms. Feb 12 19:29:41.508521 systemd[1]: Started sshd@1-10.0.0.116:22-10.0.0.1:40516.service. Feb 12 19:29:41.552033 sshd[1211]: Accepted publickey for core from 10.0.0.1 port 40516 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:41.553565 sshd[1211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:41.556777 systemd-logind[1125]: New session 2 of user core. Feb 12 19:29:41.557606 systemd[1]: Started session-2.scope. Feb 12 19:29:41.610472 sshd[1211]: pam_unix(sshd:session): session closed for user core Feb 12 19:29:41.614372 systemd[1]: Started sshd@2-10.0.0.116:22-10.0.0.1:40530.service. Feb 12 19:29:41.614878 systemd[1]: sshd@1-10.0.0.116:22-10.0.0.1:40516.service: Deactivated successfully. Feb 12 19:29:41.615520 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:29:41.616019 systemd-logind[1125]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:29:41.616990 systemd-logind[1125]: Removed session 2. Feb 12 19:29:41.657208 sshd[1216]: Accepted publickey for core from 10.0.0.1 port 40530 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:41.658891 sshd[1216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:41.662359 systemd-logind[1125]: New session 3 of user core. Feb 12 19:29:41.663194 systemd[1]: Started session-3.scope. Feb 12 19:29:41.713088 sshd[1216]: pam_unix(sshd:session): session closed for user core Feb 12 19:29:41.715844 systemd[1]: sshd@2-10.0.0.116:22-10.0.0.1:40530.service: Deactivated successfully. Feb 12 19:29:41.716664 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:29:41.717360 systemd-logind[1125]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:29:41.718794 systemd[1]: Started sshd@3-10.0.0.116:22-10.0.0.1:40542.service. Feb 12 19:29:41.719529 systemd-logind[1125]: Removed session 3. Feb 12 19:29:41.763429 sshd[1223]: Accepted publickey for core from 10.0.0.1 port 40542 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:41.765260 sshd[1223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:41.769138 systemd-logind[1125]: New session 4 of user core. Feb 12 19:29:41.771347 systemd[1]: Started session-4.scope. Feb 12 19:29:41.825783 sshd[1223]: pam_unix(sshd:session): session closed for user core Feb 12 19:29:41.829759 systemd[1]: sshd@3-10.0.0.116:22-10.0.0.1:40542.service: Deactivated successfully. Feb 12 19:29:41.830465 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:29:41.831091 systemd-logind[1125]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:29:41.832422 systemd[1]: Started sshd@4-10.0.0.116:22-10.0.0.1:40556.service. Feb 12 19:29:41.833224 systemd-logind[1125]: Removed session 4. Feb 12 19:29:41.873282 sshd[1229]: Accepted publickey for core from 10.0.0.1 port 40556 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:41.874666 sshd[1229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:41.878177 systemd-logind[1125]: New session 5 of user core. Feb 12 19:29:41.879208 systemd[1]: Started session-5.scope. Feb 12 19:29:41.939408 sudo[1232]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:29:41.939604 sudo[1232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:29:41.952129 dbus-daemon[1111]: avc: received setenforce notice (enforcing=1) Feb 12 19:29:41.954520 sudo[1232]: pam_unix(sudo:session): session closed for user root Feb 12 19:29:41.956803 sshd[1229]: pam_unix(sshd:session): session closed for user core Feb 12 19:29:41.960504 systemd[1]: sshd@4-10.0.0.116:22-10.0.0.1:40556.service: Deactivated successfully. Feb 12 19:29:41.961414 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:29:41.962241 systemd-logind[1125]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:29:41.963968 systemd[1]: Started sshd@5-10.0.0.116:22-10.0.0.1:40568.service. Feb 12 19:29:41.965084 systemd-logind[1125]: Removed session 5. Feb 12 19:29:42.004525 sshd[1236]: Accepted publickey for core from 10.0.0.1 port 40568 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:42.005617 sshd[1236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:42.008556 systemd-logind[1125]: New session 6 of user core. Feb 12 19:29:42.010465 systemd[1]: Started session-6.scope. Feb 12 19:29:42.061717 sudo[1240]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:29:42.062209 sudo[1240]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:29:42.065013 sudo[1240]: pam_unix(sudo:session): session closed for user root Feb 12 19:29:42.069187 sudo[1239]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:29:42.069387 sudo[1239]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:29:42.077583 systemd[1]: Stopping audit-rules.service... Feb 12 19:29:42.077000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:29:42.078422 auditctl[1243]: No rules Feb 12 19:29:42.078781 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:29:42.079059 systemd[1]: Stopped audit-rules.service. Feb 12 19:29:42.079999 kernel: kauditd_printk_skb: 137 callbacks suppressed Feb 12 19:29:42.080048 kernel: audit: type=1305 audit(1707766182.077:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:29:42.080077 kernel: audit: type=1300 audit(1707766182.077:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff20ae5f0 a2=420 a3=0 items=0 ppid=1 pid=1243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:42.077000 audit[1243]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff20ae5f0 a2=420 a3=0 items=0 ppid=1 pid=1243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:42.081101 systemd[1]: Starting audit-rules.service... Feb 12 19:29:42.082495 kernel: audit: type=1327 audit(1707766182.077:169): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:29:42.077000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:29:42.083256 kernel: audit: type=1131 audit(1707766182.077:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.095261 augenrules[1260]: No rules Feb 12 19:29:42.095843 systemd[1]: Finished audit-rules.service. Feb 12 19:29:42.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.098034 sudo[1239]: pam_unix(sudo:session): session closed for user root Feb 12 19:29:42.097000 audit[1239]: USER_END pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.099502 sshd[1236]: pam_unix(sshd:session): session closed for user core Feb 12 19:29:42.100449 kernel: audit: type=1130 audit(1707766182.095:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.100494 kernel: audit: type=1106 audit(1707766182.097:172): pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.100511 kernel: audit: type=1104 audit(1707766182.097:173): pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.097000 audit[1239]: CRED_DISP pid=1239 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.097000 audit[1236]: USER_END pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.102551 systemd[1]: Started sshd@6-10.0.0.116:22-10.0.0.1:40582.service. Feb 12 19:29:42.103018 systemd[1]: sshd@5-10.0.0.116:22-10.0.0.1:40568.service: Deactivated successfully. Feb 12 19:29:42.103572 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:29:42.104843 kernel: audit: type=1106 audit(1707766182.097:174): pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.104894 kernel: audit: type=1104 audit(1707766182.097:175): pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.097000 audit[1236]: CRED_DISP pid=1236 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.105257 systemd-logind[1125]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:29:42.106178 systemd-logind[1125]: Removed session 6. Feb 12 19:29:42.106823 kernel: audit: type=1130 audit(1707766182.101:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.116:22-10.0.0.1:40582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.116:22-10.0.0.1:40582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.116:22-10.0.0.1:40568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.144000 audit[1265]: USER_ACCT pid=1265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.145758 sshd[1265]: Accepted publickey for core from 10.0.0.1 port 40582 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:29:42.145000 audit[1265]: CRED_ACQ pid=1265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.146000 audit[1265]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3604030 a2=3 a3=1 items=0 ppid=1 pid=1265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:42.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:29:42.147166 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:29:42.152069 systemd-logind[1125]: New session 7 of user core. Feb 12 19:29:42.152785 systemd[1]: Started session-7.scope. Feb 12 19:29:42.155000 audit[1265]: USER_START pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.157000 audit[1268]: CRED_ACQ pid=1268 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:29:42.202000 audit[1269]: USER_ACCT pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.203034 sudo[1269]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:29:42.203250 sudo[1269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:29:42.202000 audit[1269]: CRED_REFR pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.203000 audit[1269]: USER_START pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.774889 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:29:42.780326 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:29:42.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:42.780628 systemd[1]: Reached target network-online.target. Feb 12 19:29:42.781977 systemd[1]: Starting docker.service... Feb 12 19:29:42.878235 env[1286]: time="2024-02-12T19:29:42.878175832Z" level=info msg="Starting up" Feb 12 19:29:42.879900 env[1286]: time="2024-02-12T19:29:42.879870098Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:29:42.880011 env[1286]: time="2024-02-12T19:29:42.879996033Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:29:42.880078 env[1286]: time="2024-02-12T19:29:42.880062267Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:29:42.880158 env[1286]: time="2024-02-12T19:29:42.880136404Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:29:42.882730 env[1286]: time="2024-02-12T19:29:42.882680835Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:29:42.882730 env[1286]: time="2024-02-12T19:29:42.882710999Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:29:42.882730 env[1286]: time="2024-02-12T19:29:42.882726960Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:29:42.882861 env[1286]: time="2024-02-12T19:29:42.882742296Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:29:42.886850 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3836742100-merged.mount: Deactivated successfully. Feb 12 19:29:43.042156 env[1286]: time="2024-02-12T19:29:43.042053391Z" level=info msg="Loading containers: start." Feb 12 19:29:43.088000 audit[1319]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.088000 audit[1319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd3e7cd70 a2=0 a3=1 items=0 ppid=1286 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:29:43.090000 audit[1321]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.090000 audit[1321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc58cc960 a2=0 a3=1 items=0 ppid=1286 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:29:43.092000 audit[1323]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.092000 audit[1323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd8cc5b00 a2=0 a3=1 items=0 ppid=1286 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:29:43.094000 audit[1325]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.094000 audit[1325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff1082300 a2=0 a3=1 items=0 ppid=1286 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:29:43.098000 audit[1327]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.098000 audit[1327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd13d71e0 a2=0 a3=1 items=0 ppid=1286 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:29:43.121000 audit[1332]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.121000 audit[1332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf18b590 a2=0 a3=1 items=0 ppid=1286 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:29:43.127000 audit[1334]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.127000 audit[1334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0811970 a2=0 a3=1 items=0 ppid=1286 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.127000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:29:43.128000 audit[1336]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.128000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc91e0c70 a2=0 a3=1 items=0 ppid=1286 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:29:43.130000 audit[1338]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.130000 audit[1338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd2cd57b0 a2=0 a3=1 items=0 ppid=1286 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.130000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:29:43.139000 audit[1342]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.139000 audit[1342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe886b1a0 a2=0 a3=1 items=0 ppid=1286 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:29:43.139000 audit[1343]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.139000 audit[1343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe2c90280 a2=0 a3=1 items=0 ppid=1286 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:29:43.146877 kernel: Initializing XFRM netlink socket Feb 12 19:29:43.174214 env[1286]: time="2024-02-12T19:29:43.174164528Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:29:43.188000 audit[1351]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.188000 audit[1351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe3772100 a2=0 a3=1 items=0 ppid=1286 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:29:43.205000 audit[1354]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.205000 audit[1354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff37a7360 a2=0 a3=1 items=0 ppid=1286 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.205000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:29:43.208000 audit[1357]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.208000 audit[1357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd338c660 a2=0 a3=1 items=0 ppid=1286 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.208000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:29:43.210000 audit[1359]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.210000 audit[1359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff15a4490 a2=0 a3=1 items=0 ppid=1286 pid=1359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.210000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:29:43.212000 audit[1361]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.212000 audit[1361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffee5e9a00 a2=0 a3=1 items=0 ppid=1286 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.212000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:29:43.215000 audit[1363]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.215000 audit[1363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffffec791a0 a2=0 a3=1 items=0 ppid=1286 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:29:43.217000 audit[1365]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.217000 audit[1365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff7930b90 a2=0 a3=1 items=0 ppid=1286 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:29:43.225000 audit[1368]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.225000 audit[1368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcc81fd40 a2=0 a3=1 items=0 ppid=1286 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:29:43.228000 audit[1370]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.228000 audit[1370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffdc5afb80 a2=0 a3=1 items=0 ppid=1286 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.228000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:29:43.229000 audit[1372]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.229000 audit[1372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffed028bc0 a2=0 a3=1 items=0 ppid=1286 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:29:43.231000 audit[1374]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.231000 audit[1374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffea430c60 a2=0 a3=1 items=0 ppid=1286 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:29:43.233419 systemd-networkd[1040]: docker0: Link UP Feb 12 19:29:43.240000 audit[1378]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.240000 audit[1378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6d18060 a2=0 a3=1 items=0 ppid=1286 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:29:43.241000 audit[1379]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:43.241000 audit[1379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff956e500 a2=0 a3=1 items=0 ppid=1286 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:43.241000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:29:43.243220 env[1286]: time="2024-02-12T19:29:43.243177852Z" level=info msg="Loading containers: done." Feb 12 19:29:43.269758 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck989915553-merged.mount: Deactivated successfully. Feb 12 19:29:43.277137 env[1286]: time="2024-02-12T19:29:43.277079675Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:29:43.277313 env[1286]: time="2024-02-12T19:29:43.277281837Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:29:43.277416 env[1286]: time="2024-02-12T19:29:43.277380937Z" level=info msg="Daemon has completed initialization" Feb 12 19:29:43.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:43.293980 systemd[1]: Started docker.service. Feb 12 19:29:43.299387 env[1286]: time="2024-02-12T19:29:43.299245887Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:29:43.316755 systemd[1]: Reloading. Feb 12 19:29:43.366944 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2024-02-12T19:29:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:29:43.366972 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2024-02-12T19:29:43Z" level=info msg="torcx already run" Feb 12 19:29:43.418096 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:29:43.418113 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:29:43.435346 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit: BPF prog-id=37 op=LOAD Feb 12 19:29:43.491000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit: BPF prog-id=38 op=LOAD Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.492000 audit: BPF prog-id=39 op=LOAD Feb 12 19:29:43.492000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:29:43.492000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.493000 audit: BPF prog-id=40 op=LOAD Feb 12 19:29:43.493000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit: BPF prog-id=41 op=LOAD Feb 12 19:29:43.494000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.495000 audit: BPF prog-id=42 op=LOAD Feb 12 19:29:43.495000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit: BPF prog-id=43 op=LOAD Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.496000 audit: BPF prog-id=44 op=LOAD Feb 12 19:29:43.496000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:29:43.496000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit: BPF prog-id=45 op=LOAD Feb 12 19:29:43.497000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit: BPF prog-id=46 op=LOAD Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.497000 audit: BPF prog-id=47 op=LOAD Feb 12 19:29:43.497000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:29:43.497000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.498000 audit: BPF prog-id=48 op=LOAD Feb 12 19:29:43.498000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit: BPF prog-id=49 op=LOAD Feb 12 19:29:43.499000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit: BPF prog-id=50 op=LOAD Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:43.499000 audit: BPF prog-id=51 op=LOAD Feb 12 19:29:43.499000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:29:43.499000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:29:43.513943 systemd[1]: Started kubelet.service. Feb 12 19:29:43.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:43.655589 kubelet[1465]: E0212 19:29:43.655527 1465 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:29:43.657924 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:29:43.658045 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:29:43.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:29:43.896107 env[1141]: time="2024-02-12T19:29:43.895940422Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 19:29:44.572340 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3302518926.mount: Deactivated successfully. Feb 12 19:29:46.246639 env[1141]: time="2024-02-12T19:29:46.246591199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:46.249929 env[1141]: time="2024-02-12T19:29:46.249889894Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:46.252411 env[1141]: time="2024-02-12T19:29:46.252378466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:46.254166 env[1141]: time="2024-02-12T19:29:46.254131936Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:46.255869 env[1141]: time="2024-02-12T19:29:46.255824047Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 12 19:29:46.267818 env[1141]: time="2024-02-12T19:29:46.267781984Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 19:29:47.977411 env[1141]: time="2024-02-12T19:29:47.977343215Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:47.979126 env[1141]: time="2024-02-12T19:29:47.979091158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:47.981071 env[1141]: time="2024-02-12T19:29:47.981037719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:48.073578 env[1141]: time="2024-02-12T19:29:48.073525518Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:48.074126 env[1141]: time="2024-02-12T19:29:48.074095845Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 12 19:29:48.086333 env[1141]: time="2024-02-12T19:29:48.086287542Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 19:29:49.163829 env[1141]: time="2024-02-12T19:29:49.163763692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:49.166057 env[1141]: time="2024-02-12T19:29:49.166021269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:49.168124 env[1141]: time="2024-02-12T19:29:49.168088143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:49.170299 env[1141]: time="2024-02-12T19:29:49.170263514Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:49.171129 env[1141]: time="2024-02-12T19:29:49.171091874Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 12 19:29:49.187520 env[1141]: time="2024-02-12T19:29:49.187474313Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:29:50.214193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount327518230.mount: Deactivated successfully. Feb 12 19:29:50.606490 env[1141]: time="2024-02-12T19:29:50.606440530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:50.609204 env[1141]: time="2024-02-12T19:29:50.609164951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:50.611978 env[1141]: time="2024-02-12T19:29:50.611943243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:50.613743 env[1141]: time="2024-02-12T19:29:50.613703827Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:50.614106 env[1141]: time="2024-02-12T19:29:50.614074372Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 12 19:29:50.625413 env[1141]: time="2024-02-12T19:29:50.625378410Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:29:51.077278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794712048.mount: Deactivated successfully. Feb 12 19:29:51.088238 env[1141]: time="2024-02-12T19:29:51.088172031Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:51.097709 env[1141]: time="2024-02-12T19:29:51.097665659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:51.128326 env[1141]: time="2024-02-12T19:29:51.128284782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:51.142165 env[1141]: time="2024-02-12T19:29:51.142110201Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:51.142658 env[1141]: time="2024-02-12T19:29:51.142634240Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 19:29:51.155487 env[1141]: time="2024-02-12T19:29:51.155450203Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 19:29:52.008734 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1924806978.mount: Deactivated successfully. Feb 12 19:29:53.713917 env[1141]: time="2024-02-12T19:29:53.713144393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:53.716187 env[1141]: time="2024-02-12T19:29:53.716150451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:53.719120 env[1141]: time="2024-02-12T19:29:53.718947291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:53.720549 env[1141]: time="2024-02-12T19:29:53.720497700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:53.721219 env[1141]: time="2024-02-12T19:29:53.721194642Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 12 19:29:53.730870 env[1141]: time="2024-02-12T19:29:53.730815716Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:29:53.807138 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:29:53.808039 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 19:29:53.808087 kernel: audit: type=1130 audit(1707766193.806:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:53.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:53.807336 systemd[1]: Stopped kubelet.service. Feb 12 19:29:53.808822 systemd[1]: Started kubelet.service. Feb 12 19:29:53.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:53.811625 kernel: audit: type=1131 audit(1707766193.806:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:53.811684 kernel: audit: type=1130 audit(1707766193.808:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:53.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:53.859946 kubelet[1527]: E0212 19:29:53.859893 1527 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:29:53.862613 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:29:53.862753 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:29:53.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:29:53.865881 kernel: audit: type=1131 audit(1707766193.862:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:29:54.270430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1489781914.mount: Deactivated successfully. Feb 12 19:29:54.899472 env[1141]: time="2024-02-12T19:29:54.899428555Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:54.905842 env[1141]: time="2024-02-12T19:29:54.905809825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:54.908383 env[1141]: time="2024-02-12T19:29:54.908341108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:54.909666 env[1141]: time="2024-02-12T19:29:54.909625565Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:29:54.910759 env[1141]: time="2024-02-12T19:29:54.910713376Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 12 19:29:58.891181 systemd[1]: Stopped kubelet.service. Feb 12 19:29:58.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:58.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:58.895133 kernel: audit: type=1130 audit(1707766198.890:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:58.895196 kernel: audit: type=1131 audit(1707766198.890:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:58.906520 systemd[1]: Reloading. Feb 12 19:29:58.953370 /usr/lib/systemd/system-generators/torcx-generator[1632]: time="2024-02-12T19:29:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:29:58.953399 /usr/lib/systemd/system-generators/torcx-generator[1632]: time="2024-02-12T19:29:58Z" level=info msg="torcx already run" Feb 12 19:29:59.013617 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:29:59.013817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:29:59.031651 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:29:59.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.093137 kernel: audit: type=1400 audit(1707766199.088:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.093203 kernel: audit: type=1400 audit(1707766199.088:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.093224 kernel: audit: type=1400 audit(1707766199.088:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094801 kernel: audit: type=1400 audit(1707766199.089:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.096535 kernel: audit: type=1400 audit(1707766199.089:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.098268 kernel: audit: type=1400 audit(1707766199.089:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.099948 kernel: audit: type=1400 audit(1707766199.089:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101650 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit: BPF prog-id=52 op=LOAD Feb 12 19:29:59.089000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit: BPF prog-id=53 op=LOAD Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.093000 audit: BPF prog-id=54 op=LOAD Feb 12 19:29:59.093000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:29:59.093000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.094000 audit: BPF prog-id=55 op=LOAD Feb 12 19:29:59.094000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.096000 audit: BPF prog-id=56 op=LOAD Feb 12 19:29:59.096000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.098000 audit: BPF prog-id=57 op=LOAD Feb 12 19:29:59.098000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:29:59.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit: BPF prog-id=58 op=LOAD Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.100000 audit: BPF prog-id=59 op=LOAD Feb 12 19:29:59.100000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:29:59.100000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit: BPF prog-id=60 op=LOAD Feb 12 19:29:59.101000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit: BPF prog-id=61 op=LOAD Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.101000 audit: BPF prog-id=62 op=LOAD Feb 12 19:29:59.101000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:29:59.102000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit: BPF prog-id=63 op=LOAD Feb 12 19:29:59.103000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit: BPF prog-id=64 op=LOAD Feb 12 19:29:59.103000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit: BPF prog-id=65 op=LOAD Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.103000 audit: BPF prog-id=66 op=LOAD Feb 12 19:29:59.103000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:29:59.103000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:29:59.116265 systemd[1]: Started kubelet.service. Feb 12 19:29:59.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:29:59.156713 kubelet[1670]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:29:59.156713 kubelet[1670]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:29:59.156713 kubelet[1670]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:29:59.157041 kubelet[1670]: I0212 19:29:59.156708 1670 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:29:59.811042 kubelet[1670]: I0212 19:29:59.811010 1670 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:29:59.811217 kubelet[1670]: I0212 19:29:59.811204 1670 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:29:59.811477 kubelet[1670]: I0212 19:29:59.811457 1670 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:29:59.816299 kubelet[1670]: I0212 19:29:59.816198 1670 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:29:59.816638 kubelet[1670]: E0212 19:29:59.816610 1670 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.116:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.818266 kubelet[1670]: W0212 19:29:59.818246 1670 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:29:59.819038 kubelet[1670]: I0212 19:29:59.819010 1670 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:29:59.819322 kubelet[1670]: I0212 19:29:59.819307 1670 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:29:59.819472 kubelet[1670]: I0212 19:29:59.819454 1670 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:29:59.819594 kubelet[1670]: I0212 19:29:59.819580 1670 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:29:59.819658 kubelet[1670]: I0212 19:29:59.819648 1670 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:29:59.819804 kubelet[1670]: I0212 19:29:59.819790 1670 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:29:59.823742 kubelet[1670]: I0212 19:29:59.823702 1670 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:29:59.823742 kubelet[1670]: I0212 19:29:59.823732 1670 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:29:59.824348 kubelet[1670]: W0212 19:29:59.824289 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.824389 kubelet[1670]: E0212 19:29:59.824361 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.827284 kubelet[1670]: I0212 19:29:59.827244 1670 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:29:59.827320 kubelet[1670]: I0212 19:29:59.827297 1670 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:29:59.827808 kubelet[1670]: W0212 19:29:59.827738 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.827808 kubelet[1670]: E0212 19:29:59.827807 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.828520 kubelet[1670]: I0212 19:29:59.828482 1670 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:29:59.829084 kubelet[1670]: W0212 19:29:59.829059 1670 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:29:59.829802 kubelet[1670]: I0212 19:29:59.829782 1670 server.go:1168] "Started kubelet" Feb 12 19:29:59.829974 kubelet[1670]: I0212 19:29:59.829947 1670 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:29:59.830407 kubelet[1670]: I0212 19:29:59.830382 1670 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:29:59.830593 kubelet[1670]: I0212 19:29:59.830566 1670 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:29:59.830842 kubelet[1670]: E0212 19:29:59.830753 1670 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b3344f84458dcc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 29, 59, 829761484, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 29, 59, 829761484, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.116:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.116:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:29:59.831642 kubelet[1670]: E0212 19:29:59.831621 1670 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:29:59.831687 kubelet[1670]: E0212 19:29:59.831653 1670 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:29:59.831000 audit[1670]: AVC avc: denied { mac_admin } for pid=1670 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.831000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:29:59.831000 audit[1670]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a51230 a1=4000a36888 a2=4000a51200 a3=25 items=0 ppid=1 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.831000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:29:59.831000 audit[1670]: AVC avc: denied { mac_admin } for pid=1670 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.831000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:29:59.831000 audit[1670]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bb27a0 a1=4000a368a0 a2=4000a512c0 a3=25 items=0 ppid=1 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.831000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:29:59.832774 kubelet[1670]: I0212 19:29:59.832443 1670 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:29:59.832774 kubelet[1670]: I0212 19:29:59.832478 1670 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:29:59.832774 kubelet[1670]: I0212 19:29:59.832527 1670 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:29:59.832774 kubelet[1670]: I0212 19:29:59.832747 1670 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:29:59.832920 kubelet[1670]: I0212 19:29:59.832893 1670 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:29:59.833275 kubelet[1670]: W0212 19:29:59.833187 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.833275 kubelet[1670]: E0212 19:29:59.833235 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.834106 kubelet[1670]: E0212 19:29:59.834067 1670 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="200ms" Feb 12 19:29:59.836000 audit[1682]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.836000 audit[1682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffdfc8850 a2=0 a3=1 items=0 ppid=1670 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:29:59.837000 audit[1683]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.837000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1b187c0 a2=0 a3=1 items=0 ppid=1670 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:29:59.839000 audit[1685]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.839000 audit[1685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffd2d2710 a2=0 a3=1 items=0 ppid=1670 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:29:59.841000 audit[1687]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.841000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe8773b10 a2=0 a3=1 items=0 ppid=1670 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:29:59.852000 audit[1692]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.852000 audit[1692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe17a8ba0 a2=0 a3=1 items=0 ppid=1670 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:29:59.853511 kubelet[1670]: I0212 19:29:59.853487 1670 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:29:59.853000 audit[1694]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:29:59.853000 audit[1694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd6eeba50 a2=0 a3=1 items=0 ppid=1670 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:29:59.854000 audit[1695]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.854000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8583e20 a2=0 a3=1 items=0 ppid=1670 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:29:59.855196 kubelet[1670]: I0212 19:29:59.855178 1670 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:29:59.855238 kubelet[1670]: I0212 19:29:59.855226 1670 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:29:59.855261 kubelet[1670]: I0212 19:29:59.855244 1670 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:29:59.855356 kubelet[1670]: E0212 19:29:59.855342 1670 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:29:59.856120 kubelet[1670]: W0212 19:29:59.855898 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.856120 kubelet[1670]: E0212 19:29:59.855961 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:29:59.856275 kubelet[1670]: I0212 19:29:59.856251 1670 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:29:59.856275 kubelet[1670]: I0212 19:29:59.856272 1670 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:29:59.856327 kubelet[1670]: I0212 19:29:59.856288 1670 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:29:59.855000 audit[1697]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:29:59.855000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff148f0b0 a2=0 a3=1 items=0 ppid=1670 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:29:59.855000 audit[1699]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.855000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb40b810 a2=0 a3=1 items=0 ppid=1670 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:29:59.856000 audit[1700]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:29:59.856000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffceb66c30 a2=0 a3=1 items=0 ppid=1670 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:29:59.857000 audit[1701]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:29:59.857000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc61cd520 a2=0 a3=1 items=0 ppid=1670 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:29:59.857000 audit[1702]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:29:59.857000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcfa672c0 a2=0 a3=1 items=0 ppid=1670 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:29:59.873655 kubelet[1670]: I0212 19:29:59.873611 1670 policy_none.go:49] "None policy: Start" Feb 12 19:29:59.874431 kubelet[1670]: I0212 19:29:59.874414 1670 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:29:59.874474 kubelet[1670]: I0212 19:29:59.874470 1670 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:29:59.879175 systemd[1]: Created slice kubepods.slice. Feb 12 19:29:59.882486 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:29:59.884632 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:29:59.896464 kubelet[1670]: I0212 19:29:59.896443 1670 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:29:59.895000 audit[1670]: AVC avc: denied { mac_admin } for pid=1670 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:29:59.895000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:29:59.895000 audit[1670]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dcac00 a1=400101af60 a2=4000dcabd0 a3=25 items=0 ppid=1 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:29:59.895000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:29:59.896820 kubelet[1670]: I0212 19:29:59.896808 1670 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:29:59.897104 kubelet[1670]: I0212 19:29:59.897088 1670 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:29:59.897650 kubelet[1670]: E0212 19:29:59.897623 1670 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 19:29:59.934153 kubelet[1670]: I0212 19:29:59.934125 1670 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:29:59.934607 kubelet[1670]: E0212 19:29:59.934589 1670 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" Feb 12 19:29:59.955916 kubelet[1670]: I0212 19:29:59.955895 1670 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:29:59.957024 kubelet[1670]: I0212 19:29:59.956995 1670 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:29:59.957924 kubelet[1670]: I0212 19:29:59.957904 1670 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:29:59.962160 systemd[1]: Created slice kubepods-burstable-pod8fce8cae8ecb17571ee6853bc5fd6c22.slice. Feb 12 19:29:59.990378 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 12 19:30:00.005555 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 12 19:30:00.034874 kubelet[1670]: E0212 19:30:00.034835 1670 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="400ms" Feb 12 19:30:00.134265 kubelet[1670]: I0212 19:30:00.134161 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8fce8cae8ecb17571ee6853bc5fd6c22-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8fce8cae8ecb17571ee6853bc5fd6c22\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:00.134265 kubelet[1670]: I0212 19:30:00.134216 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8fce8cae8ecb17571ee6853bc5fd6c22-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8fce8cae8ecb17571ee6853bc5fd6c22\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:00.134265 kubelet[1670]: I0212 19:30:00.134240 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:00.134407 kubelet[1670]: I0212 19:30:00.134318 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:00.134407 kubelet[1670]: I0212 19:30:00.134366 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:00.134458 kubelet[1670]: I0212 19:30:00.134410 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8fce8cae8ecb17571ee6853bc5fd6c22-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8fce8cae8ecb17571ee6853bc5fd6c22\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:00.134458 kubelet[1670]: I0212 19:30:00.134431 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:00.134458 kubelet[1670]: I0212 19:30:00.134450 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:00.134527 kubelet[1670]: I0212 19:30:00.134469 1670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:30:00.136715 kubelet[1670]: I0212 19:30:00.136689 1670 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:30:00.137240 kubelet[1670]: E0212 19:30:00.137111 1670 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" Feb 12 19:30:00.288805 kubelet[1670]: E0212 19:30:00.288777 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:00.289830 env[1141]: time="2024-02-12T19:30:00.289793873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8fce8cae8ecb17571ee6853bc5fd6c22,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:00.303011 kubelet[1670]: E0212 19:30:00.302980 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:00.303443 env[1141]: time="2024-02-12T19:30:00.303408653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:00.308014 kubelet[1670]: E0212 19:30:00.307989 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:00.308681 env[1141]: time="2024-02-12T19:30:00.308374343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:00.436012 kubelet[1670]: E0212 19:30:00.435923 1670 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="800ms" Feb 12 19:30:00.539808 kubelet[1670]: I0212 19:30:00.539776 1670 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:30:00.540167 kubelet[1670]: E0212 19:30:00.540150 1670 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.116:6443/api/v1/nodes\": dial tcp 10.0.0.116:6443: connect: connection refused" node="localhost" Feb 12 19:30:00.718224 kubelet[1670]: W0212 19:30:00.718070 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:00.718224 kubelet[1670]: E0212 19:30:00.718136 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:00.766371 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1761274869.mount: Deactivated successfully. Feb 12 19:30:00.769216 kubelet[1670]: W0212 19:30:00.769120 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:00.769216 kubelet[1670]: E0212 19:30:00.769215 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.116:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:00.771805 env[1141]: time="2024-02-12T19:30:00.771745433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.774286 env[1141]: time="2024-02-12T19:30:00.774238797Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.775705 env[1141]: time="2024-02-12T19:30:00.775666759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.776639 env[1141]: time="2024-02-12T19:30:00.776596152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.777578 env[1141]: time="2024-02-12T19:30:00.777540315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.779168 env[1141]: time="2024-02-12T19:30:00.779129636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.780030 env[1141]: time="2024-02-12T19:30:00.779994557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.783810 env[1141]: time="2024-02-12T19:30:00.783760951Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.785893 env[1141]: time="2024-02-12T19:30:00.785845847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.788066 env[1141]: time="2024-02-12T19:30:00.788026793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.789672 env[1141]: time="2024-02-12T19:30:00.789633519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.791141 env[1141]: time="2024-02-12T19:30:00.791105473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.828076071Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.828117309Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.828127289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.828343220Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd10e5ba80cf6b207187435e3f27567c62968e12f69cc194dd15f261757bbc07 pid=1727 runtime=io.containerd.runc.v2 Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.827650916Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.827757983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:00.828752 env[1141]: time="2024-02-12T19:30:00.827768762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:00.829151 env[1141]: time="2024-02-12T19:30:00.828752367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3a773d2189deaffe408aaf339923772a6573deb9e77089260abc1aa5a5d3985d pid=1723 runtime=io.containerd.runc.v2 Feb 12 19:30:00.829367 env[1141]: time="2024-02-12T19:30:00.829311935Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:00.829458 env[1141]: time="2024-02-12T19:30:00.829385988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:00.829491 env[1141]: time="2024-02-12T19:30:00.829472615Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:00.830329 env[1141]: time="2024-02-12T19:30:00.829674814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ff1ff40bf08a9711eb2410034881b1451be5d1e18a25fccedd35849db946210 pid=1726 runtime=io.containerd.runc.v2 Feb 12 19:30:00.843143 systemd[1]: Started cri-containerd-3a773d2189deaffe408aaf339923772a6573deb9e77089260abc1aa5a5d3985d.scope. Feb 12 19:30:00.844076 systemd[1]: Started cri-containerd-dd10e5ba80cf6b207187435e3f27567c62968e12f69cc194dd15f261757bbc07.scope. Feb 12 19:30:00.862335 systemd[1]: Started cri-containerd-4ff1ff40bf08a9711eb2410034881b1451be5d1e18a25fccedd35849db946210.scope. Feb 12 19:30:00.880349 kubelet[1670]: W0212 19:30:00.880250 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:00.880349 kubelet[1670]: E0212 19:30:00.880312 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:00.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit: BPF prog-id=67 op=LOAD Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1727 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464313065356261383063663662323037313837343335653366323735 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1727 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464313065356261383063663662323037313837343335653366323735 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit: BPF prog-id=68 op=LOAD Feb 12 19:30:00.886000 audit[1758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1727 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464313065356261383063663662323037313837343335653366323735 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit: BPF prog-id=69 op=LOAD Feb 12 19:30:00.886000 audit[1758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1727 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464313065356261383063663662323037313837343335653366323735 Feb 12 19:30:00.886000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:30:00.886000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.886000 audit: BPF prog-id=70 op=LOAD Feb 12 19:30:00.886000 audit[1758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1727 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464313065356261383063663662323037313837343335653366323735 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit: BPF prog-id=71 op=LOAD Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1723 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373733643231383964656166666534303861616633333939323337 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1723 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373733643231383964656166666534303861616633333939323337 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.887000 audit: BPF prog-id=72 op=LOAD Feb 12 19:30:00.887000 audit[1756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1723 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373733643231383964656166666534303861616633333939323337 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit: BPF prog-id=73 op=LOAD Feb 12 19:30:00.888000 audit[1756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1723 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373733643231383964656166666534303861616633333939323337 Feb 12 19:30:00.888000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:30:00.888000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.888000 audit: BPF prog-id=74 op=LOAD Feb 12 19:30:00.888000 audit[1756]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1723 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373733643231383964656166666534303861616633333939323337 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit: BPF prog-id=75 op=LOAD Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1726 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663166663430626630386139373131656232343130303334383831 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1726 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663166663430626630386139373131656232343130303334383831 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.889000 audit: BPF prog-id=76 op=LOAD Feb 12 19:30:00.889000 audit[1757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1726 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663166663430626630386139373131656232343130303334383831 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit: BPF prog-id=77 op=LOAD Feb 12 19:30:00.890000 audit[1757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1726 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663166663430626630386139373131656232343130303334383831 Feb 12 19:30:00.890000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:30:00.890000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:00.890000 audit: BPF prog-id=78 op=LOAD Feb 12 19:30:00.890000 audit[1757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1726 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:00.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663166663430626630386139373131656232343130303334383831 Feb 12 19:30:00.915060 env[1141]: time="2024-02-12T19:30:00.915013955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"dd10e5ba80cf6b207187435e3f27567c62968e12f69cc194dd15f261757bbc07\"" Feb 12 19:30:00.916583 kubelet[1670]: E0212 19:30:00.916407 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:00.918126 env[1141]: time="2024-02-12T19:30:00.918095989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8fce8cae8ecb17571ee6853bc5fd6c22,Namespace:kube-system,Attempt:0,} returns sandbox id \"3a773d2189deaffe408aaf339923772a6573deb9e77089260abc1aa5a5d3985d\"" Feb 12 19:30:00.918755 kubelet[1670]: E0212 19:30:00.918733 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:00.920754 env[1141]: time="2024-02-12T19:30:00.919164345Z" level=info msg="CreateContainer within sandbox \"dd10e5ba80cf6b207187435e3f27567c62968e12f69cc194dd15f261757bbc07\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:30:00.921279 env[1141]: time="2024-02-12T19:30:00.921109399Z" level=info msg="CreateContainer within sandbox \"3a773d2189deaffe408aaf339923772a6573deb9e77089260abc1aa5a5d3985d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:30:00.921359 env[1141]: time="2024-02-12T19:30:00.921137504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"4ff1ff40bf08a9711eb2410034881b1451be5d1e18a25fccedd35849db946210\"" Feb 12 19:30:00.921968 kubelet[1670]: E0212 19:30:00.921945 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:00.923998 env[1141]: time="2024-02-12T19:30:00.923958217Z" level=info msg="CreateContainer within sandbox \"4ff1ff40bf08a9711eb2410034881b1451be5d1e18a25fccedd35849db946210\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:30:00.944058 env[1141]: time="2024-02-12T19:30:00.943921818Z" level=info msg="CreateContainer within sandbox \"dd10e5ba80cf6b207187435e3f27567c62968e12f69cc194dd15f261757bbc07\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"77fbb5b0de26e5f6aeafd1d11607e5cacaa09d7a37adcb3a268e9bae637a0c4e\"" Feb 12 19:30:00.944906 env[1141]: time="2024-02-12T19:30:00.944876720Z" level=info msg="StartContainer for \"77fbb5b0de26e5f6aeafd1d11607e5cacaa09d7a37adcb3a268e9bae637a0c4e\"" Feb 12 19:30:00.948120 env[1141]: time="2024-02-12T19:30:00.947132077Z" level=info msg="CreateContainer within sandbox \"3a773d2189deaffe408aaf339923772a6573deb9e77089260abc1aa5a5d3985d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a649997deacdaa4234686b656de2a2c0692fceaf6cfd76da73af91294bac464f\"" Feb 12 19:30:00.948465 env[1141]: time="2024-02-12T19:30:00.948424069Z" level=info msg="StartContainer for \"a649997deacdaa4234686b656de2a2c0692fceaf6cfd76da73af91294bac464f\"" Feb 12 19:30:00.949387 env[1141]: time="2024-02-12T19:30:00.949330268Z" level=info msg="CreateContainer within sandbox \"4ff1ff40bf08a9711eb2410034881b1451be5d1e18a25fccedd35849db946210\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"247e8f5c01203826ec6c850da65f6e696b281f4a403463128ea213a0e3b84159\"" Feb 12 19:30:00.949850 env[1141]: time="2024-02-12T19:30:00.949798777Z" level=info msg="StartContainer for \"247e8f5c01203826ec6c850da65f6e696b281f4a403463128ea213a0e3b84159\"" Feb 12 19:30:00.967159 systemd[1]: Started cri-containerd-247e8f5c01203826ec6c850da65f6e696b281f4a403463128ea213a0e3b84159.scope. Feb 12 19:30:00.968017 systemd[1]: Started cri-containerd-a649997deacdaa4234686b656de2a2c0692fceaf6cfd76da73af91294bac464f.scope. Feb 12 19:30:00.981519 systemd[1]: Started cri-containerd-77fbb5b0de26e5f6aeafd1d11607e5cacaa09d7a37adcb3a268e9bae637a0c4e.scope. Feb 12 19:30:01.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.018000 audit: BPF prog-id=79 op=LOAD Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1723 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343939393764656163646161343233343638366236353664653261 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1723 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343939393764656163646161343233343638366236353664653261 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit: BPF prog-id=80 op=LOAD Feb 12 19:30:01.021000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1723 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343939393764656163646161343233343638366236353664653261 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit: BPF prog-id=81 op=LOAD Feb 12 19:30:01.021000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1723 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343939393764656163646161343233343638366236353664653261 Feb 12 19:30:01.021000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:30:01.021000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.021000 audit: BPF prog-id=82 op=LOAD Feb 12 19:30:01.021000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1723 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136343939393764656163646161343233343638366236353664653261 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.022000 audit: BPF prog-id=83 op=LOAD Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1726 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376538663563303132303338323665633663383530646136356636 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1726 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376538663563303132303338323665633663383530646136356636 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit: BPF prog-id=84 op=LOAD Feb 12 19:30:01.025000 audit[1853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1726 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376538663563303132303338323665633663383530646136356636 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit: BPF prog-id=85 op=LOAD Feb 12 19:30:01.025000 audit[1853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1726 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376538663563303132303338323665633663383530646136356636 Feb 12 19:30:01.025000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:30:01.025000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.025000 audit: BPF prog-id=86 op=LOAD Feb 12 19:30:01.025000 audit[1853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1726 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376538663563303132303338323665633663383530646136356636 Feb 12 19:30:01.028548 kubelet[1670]: W0212 19:30:01.028473 1670 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:01.028548 kubelet[1670]: E0212 19:30:01.028545 1670 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.116:6443: connect: connection refused Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.029000 audit: BPF prog-id=87 op=LOAD Feb 12 19:30:01.029000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.029000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1727 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666262356230646532366535663661656166643164313136303765 Feb 12 19:30:01.029000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.029000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1727 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666262356230646532366535663661656166643164313136303765 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit: BPF prog-id=88 op=LOAD Feb 12 19:30:01.030000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1727 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666262356230646532366535663661656166643164313136303765 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit: BPF prog-id=89 op=LOAD Feb 12 19:30:01.030000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1727 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666262356230646532366535663661656166643164313136303765 Feb 12 19:30:01.030000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:30:01.030000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:01.030000 audit: BPF prog-id=90 op=LOAD Feb 12 19:30:01.030000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1727 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:01.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737666262356230646532366535663661656166643164313136303765 Feb 12 19:30:01.060323 env[1141]: time="2024-02-12T19:30:01.060269223Z" level=info msg="StartContainer for \"a649997deacdaa4234686b656de2a2c0692fceaf6cfd76da73af91294bac464f\" returns successfully" Feb 12 19:30:01.060896 env[1141]: time="2024-02-12T19:30:01.060850811Z" level=info msg="StartContainer for \"77fbb5b0de26e5f6aeafd1d11607e5cacaa09d7a37adcb3a268e9bae637a0c4e\" returns successfully" Feb 12 19:30:01.069234 env[1141]: time="2024-02-12T19:30:01.065994468Z" level=info msg="StartContainer for \"247e8f5c01203826ec6c850da65f6e696b281f4a403463128ea213a0e3b84159\" returns successfully" Feb 12 19:30:01.238422 kubelet[1670]: E0212 19:30:01.238272 1670 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.116:6443: connect: connection refused" interval="1.6s" Feb 12 19:30:01.342286 kubelet[1670]: I0212 19:30:01.341987 1670 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:30:01.864171 kubelet[1670]: E0212 19:30:01.864144 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:01.866163 kubelet[1670]: E0212 19:30:01.866138 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:01.867250 kubelet[1670]: E0212 19:30:01.867232 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:02.869236 kubelet[1670]: E0212 19:30:02.869206 1670 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:02.989000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:02.989000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=4001ba60a0 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:30:02.988000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:02.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:30:02.988000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4009efa000 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:30:02.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:30:02.989000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:02.989000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4009efa060 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:30:02.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:30:02.990000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:02.990000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4007a1c720 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:30:02.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:30:03.006000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:03.006000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=40024b9b80 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:30:03.006000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:30:03.007000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:03.007000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=4007a1d770 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:30:03.007000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:30:03.074681 kubelet[1670]: I0212 19:30:03.074629 1670 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:30:03.105050 kubelet[1670]: E0212 19:30:03.105018 1670 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:30:03.104000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:03.104000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004f33b0 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:03.104000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:03.104000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:03.104000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000dd4040 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:03.104000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:03.137363 kubelet[1670]: E0212 19:30:03.137254 1670 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Feb 12 19:30:03.205282 kubelet[1670]: E0212 19:30:03.205241 1670 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:30:03.306297 kubelet[1670]: E0212 19:30:03.306247 1670 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:30:03.407192 kubelet[1670]: E0212 19:30:03.407096 1670 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:30:03.507840 kubelet[1670]: E0212 19:30:03.507804 1670 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:30:03.608672 kubelet[1670]: E0212 19:30:03.608637 1670 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:30:03.829013 kubelet[1670]: I0212 19:30:03.828980 1670 apiserver.go:52] "Watching apiserver" Feb 12 19:30:03.833434 kubelet[1670]: I0212 19:30:03.833406 1670 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:30:03.858826 kubelet[1670]: I0212 19:30:03.858783 1670 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:30:05.718494 systemd[1]: Reloading. Feb 12 19:30:05.764341 /usr/lib/systemd/system-generators/torcx-generator[1964]: time="2024-02-12T19:30:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:30:05.764370 /usr/lib/systemd/system-generators/torcx-generator[1964]: time="2024-02-12T19:30:05Z" level=info msg="torcx already run" Feb 12 19:30:05.828917 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:30:05.829100 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:30:05.846903 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:30:05.925585 kernel: kauditd_printk_skb: 581 callbacks suppressed Feb 12 19:30:05.925693 kernel: audit: type=1400 audit(1707766205.917:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925713 kernel: audit: type=1400 audit(1707766205.917:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925729 kernel: audit: type=1400 audit(1707766205.917:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925743 kernel: audit: type=1400 audit(1707766205.917:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.930121 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:30:05.930194 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:30:05.930210 kernel: audit: type=1400 audit(1707766205.917:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.930224 kernel: audit: backlog limit exceeded Feb 12 19:30:05.930242 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932733 kernel: audit: type=1400 audit(1707766205.917:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit: BPF prog-id=91 op=LOAD Feb 12 19:30:05.917000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit: BPF prog-id=92 op=LOAD Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.921000 audit: BPF prog-id=93 op=LOAD Feb 12 19:30:05.921000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:30:05.921000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit: BPF prog-id=94 op=LOAD Feb 12 19:30:05.923000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.924000 audit: BPF prog-id=95 op=LOAD Feb 12 19:30:05.924000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.925000 audit: BPF prog-id=96 op=LOAD Feb 12 19:30:05.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.932000 audit: BPF prog-id=101 op=LOAD Feb 12 19:30:05.932000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.933000 audit: BPF prog-id=102 op=LOAD Feb 12 19:30:05.933000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit: BPF prog-id=103 op=LOAD Feb 12 19:30:05.935000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit: BPF prog-id=104 op=LOAD Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit: BPF prog-id=105 op=LOAD Feb 12 19:30:05.935000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:30:05.935000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.935000 audit: BPF prog-id=106 op=LOAD Feb 12 19:30:05.935000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.936000 audit: BPF prog-id=107 op=LOAD Feb 12 19:30:05.936000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit: BPF prog-id=108 op=LOAD Feb 12 19:30:05.937000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit: BPF prog-id=109 op=LOAD Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.937000 audit: BPF prog-id=110 op=LOAD Feb 12 19:30:05.937000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:30:05.937000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:05.938000 audit: BPF prog-id=111 op=LOAD Feb 12 19:30:05.938000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:30:05.949507 systemd[1]: Stopping kubelet.service... Feb 12 19:30:05.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:05.972148 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:30:05.972342 systemd[1]: Stopped kubelet.service. Feb 12 19:30:05.974097 systemd[1]: Started kubelet.service. Feb 12 19:30:05.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:06.045875 kubelet[2002]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:30:06.045875 kubelet[2002]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:30:06.045875 kubelet[2002]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:30:06.046232 kubelet[2002]: I0212 19:30:06.045949 2002 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:30:06.051071 kubelet[2002]: I0212 19:30:06.051035 2002 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:30:06.051071 kubelet[2002]: I0212 19:30:06.051065 2002 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:30:06.051269 kubelet[2002]: I0212 19:30:06.051253 2002 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:30:06.052757 kubelet[2002]: I0212 19:30:06.052734 2002 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:30:06.053709 kubelet[2002]: I0212 19:30:06.053687 2002 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:30:06.055201 kubelet[2002]: W0212 19:30:06.055180 2002 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:30:06.055989 kubelet[2002]: I0212 19:30:06.055968 2002 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:30:06.056162 kubelet[2002]: I0212 19:30:06.056146 2002 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:30:06.056228 kubelet[2002]: I0212 19:30:06.056212 2002 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:30:06.056309 kubelet[2002]: I0212 19:30:06.056233 2002 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:30:06.056309 kubelet[2002]: I0212 19:30:06.056243 2002 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:30:06.056309 kubelet[2002]: I0212 19:30:06.056272 2002 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:30:06.058842 kubelet[2002]: I0212 19:30:06.058817 2002 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:30:06.058924 kubelet[2002]: I0212 19:30:06.058848 2002 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:30:06.058924 kubelet[2002]: I0212 19:30:06.058893 2002 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:30:06.058924 kubelet[2002]: I0212 19:30:06.058908 2002 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:30:06.060028 kubelet[2002]: I0212 19:30:06.060008 2002 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:30:06.060881 kubelet[2002]: I0212 19:30:06.060844 2002 server.go:1168] "Started kubelet" Feb 12 19:30:06.061000 audit[2002]: AVC avc: denied { mac_admin } for pid=2002 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:06.061000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:30:06.061000 audit[2002]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a33500 a1=4000e00780 a2=4000a334d0 a3=25 items=0 ppid=1 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:06.061000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:30:06.063264 kubelet[2002]: I0212 19:30:06.063236 2002 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:30:06.062000 audit[2002]: AVC avc: denied { mac_admin } for pid=2002 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:06.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:30:06.062000 audit[2002]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000e3f60 a1=4000e00798 a2=4000a33590 a3=25 items=0 ppid=1 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:06.062000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:30:06.063600 kubelet[2002]: I0212 19:30:06.063583 2002 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:30:06.063701 kubelet[2002]: I0212 19:30:06.063680 2002 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:30:06.070078 kubelet[2002]: E0212 19:30:06.065438 2002 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:30:06.070078 kubelet[2002]: E0212 19:30:06.065468 2002 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:30:06.070078 kubelet[2002]: I0212 19:30:06.066607 2002 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:30:06.070078 kubelet[2002]: I0212 19:30:06.067297 2002 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:30:06.071136 kubelet[2002]: I0212 19:30:06.071098 2002 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:30:06.071909 kubelet[2002]: I0212 19:30:06.071878 2002 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:30:06.073451 kubelet[2002]: I0212 19:30:06.073421 2002 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:30:06.082947 kubelet[2002]: I0212 19:30:06.082923 2002 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:30:06.086700 kubelet[2002]: I0212 19:30:06.086672 2002 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:30:06.086783 kubelet[2002]: I0212 19:30:06.086708 2002 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:30:06.086783 kubelet[2002]: I0212 19:30:06.086726 2002 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:30:06.086850 kubelet[2002]: E0212 19:30:06.086795 2002 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:30:06.147228 kubelet[2002]: I0212 19:30:06.147188 2002 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:30:06.147468 kubelet[2002]: I0212 19:30:06.147452 2002 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:30:06.147547 kubelet[2002]: I0212 19:30:06.147537 2002 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:30:06.147798 kubelet[2002]: I0212 19:30:06.147779 2002 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:30:06.148371 kubelet[2002]: I0212 19:30:06.148351 2002 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:30:06.148505 kubelet[2002]: I0212 19:30:06.148491 2002 policy_none.go:49] "None policy: Start" Feb 12 19:30:06.152195 kubelet[2002]: I0212 19:30:06.152171 2002 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:30:06.152471 kubelet[2002]: I0212 19:30:06.152216 2002 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:30:06.153178 kubelet[2002]: I0212 19:30:06.153147 2002 state_mem.go:75] "Updated machine memory state" Feb 12 19:30:06.159000 audit[2002]: AVC avc: denied { mac_admin } for pid=2002 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:06.159000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:30:06.159000 audit[2002]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40012aad20 a1=4001297458 a2=40012aacf0 a3=25 items=0 ppid=1 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:06.159000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:30:06.162611 kubelet[2002]: I0212 19:30:06.160546 2002 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:30:06.162611 kubelet[2002]: I0212 19:30:06.160615 2002 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:30:06.162611 kubelet[2002]: I0212 19:30:06.160895 2002 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:30:06.182819 kubelet[2002]: I0212 19:30:06.182790 2002 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:30:06.187572 kubelet[2002]: I0212 19:30:06.186985 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:06.188096 kubelet[2002]: I0212 19:30:06.187077 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:06.188272 kubelet[2002]: I0212 19:30:06.188246 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:06.191413 kubelet[2002]: I0212 19:30:06.191387 2002 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 19:30:06.191506 kubelet[2002]: I0212 19:30:06.191466 2002 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:30:06.276676 kubelet[2002]: I0212 19:30:06.276574 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:06.276832 kubelet[2002]: I0212 19:30:06.276818 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:06.276921 kubelet[2002]: I0212 19:30:06.276910 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:06.276996 kubelet[2002]: I0212 19:30:06.276986 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:06.277087 kubelet[2002]: I0212 19:30:06.277076 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:30:06.277158 kubelet[2002]: I0212 19:30:06.277148 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8fce8cae8ecb17571ee6853bc5fd6c22-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8fce8cae8ecb17571ee6853bc5fd6c22\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:06.277227 kubelet[2002]: I0212 19:30:06.277218 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8fce8cae8ecb17571ee6853bc5fd6c22-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8fce8cae8ecb17571ee6853bc5fd6c22\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:06.277295 kubelet[2002]: I0212 19:30:06.277286 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8fce8cae8ecb17571ee6853bc5fd6c22-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8fce8cae8ecb17571ee6853bc5fd6c22\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:06.277363 kubelet[2002]: I0212 19:30:06.277354 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:30:06.498478 kubelet[2002]: E0212 19:30:06.498441 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:06.498958 kubelet[2002]: E0212 19:30:06.498940 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:06.499156 kubelet[2002]: E0212 19:30:06.499140 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:07.064590 kubelet[2002]: I0212 19:30:07.064541 2002 apiserver.go:52] "Watching apiserver" Feb 12 19:30:07.072392 kubelet[2002]: I0212 19:30:07.072354 2002 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:30:07.081769 kubelet[2002]: I0212 19:30:07.081725 2002 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:30:07.118701 kubelet[2002]: E0212 19:30:07.118669 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:07.119923 kubelet[2002]: E0212 19:30:07.119899 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:07.124718 kubelet[2002]: E0212 19:30:07.124701 2002 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:30:07.125718 kubelet[2002]: E0212 19:30:07.125702 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:07.141681 kubelet[2002]: I0212 19:30:07.141656 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.141604088 podCreationTimestamp="2024-02-12 19:30:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:30:07.14144709 +0000 UTC m=+1.158503632" watchObservedRunningTime="2024-02-12 19:30:07.141604088 +0000 UTC m=+1.158660630" Feb 12 19:30:07.154754 kubelet[2002]: I0212 19:30:07.154726 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.154692924 podCreationTimestamp="2024-02-12 19:30:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:30:07.148117091 +0000 UTC m=+1.165173673" watchObservedRunningTime="2024-02-12 19:30:07.154692924 +0000 UTC m=+1.171749466" Feb 12 19:30:08.120010 kubelet[2002]: E0212 19:30:08.119982 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:08.120391 kubelet[2002]: E0212 19:30:08.120284 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:09.121907 kubelet[2002]: E0212 19:30:09.121883 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:10.831706 sudo[1269]: pam_unix(sudo:session): session closed for user root Feb 12 19:30:10.830000 audit[1269]: USER_END pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:10.830000 audit[1269]: CRED_DISP pid=1269 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:30:10.833114 sshd[1265]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:10.833000 audit[1265]: USER_END pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:10.833000 audit[1265]: CRED_DISP pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:10.835510 systemd[1]: sshd@6-10.0.0.116:22-10.0.0.1:40582.service: Deactivated successfully. Feb 12 19:30:10.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.116:22-10.0.0.1:40582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:10.836252 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:30:10.836429 systemd[1]: session-7.scope: Consumed 5.780s CPU time. Feb 12 19:30:10.836834 systemd-logind[1125]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:30:10.837611 systemd-logind[1125]: Removed session 7. Feb 12 19:30:13.972779 kubelet[2002]: E0212 19:30:13.972747 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:13.987819 kubelet[2002]: I0212 19:30:13.987785 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=7.987755657 podCreationTimestamp="2024-02-12 19:30:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:30:07.155266837 +0000 UTC m=+1.172323379" watchObservedRunningTime="2024-02-12 19:30:13.987755657 +0000 UTC m=+8.004812159" Feb 12 19:30:14.127903 kubelet[2002]: E0212 19:30:14.127852 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:17.584640 kubelet[2002]: E0212 19:30:17.583788 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:17.619085 kubelet[2002]: E0212 19:30:17.619043 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:18.134817 kubelet[2002]: E0212 19:30:18.134764 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:18.508000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.511955 kernel: kauditd_printk_skb: 326 callbacks suppressed Feb 12 19:30:18.512052 kernel: audit: type=1400 audit(1707766218.508:912): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.512083 kernel: audit: type=1400 audit(1707766218.508:913): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.508000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.508000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400136a580 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.516953 kernel: audit: type=1300 audit(1707766218.508:913): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400136a580 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.517003 kernel: audit: type=1327 audit(1707766218.508:913): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.508000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.509000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.521538 kernel: audit: type=1400 audit(1707766218.509:914): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.521574 kernel: audit: type=1300 audit(1707766218.509:914): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400136a5c0 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.509000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400136a5c0 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.526977 kernel: audit: type=1327 audit(1707766218.509:914): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.527028 kernel: audit: type=1300 audit(1707766218.508:912): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011dabc0 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.508000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011dabc0 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.508000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.532454 kernel: audit: type=1327 audit(1707766218.508:912): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.532518 kernel: audit: type=1400 audit(1707766218.510:915): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.510000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:30:18.510000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400136a700 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:18.657000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:30:18.657000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000df2c00 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:30:18.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:30:19.679815 kubelet[2002]: I0212 19:30:19.679784 2002 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:30:19.680714 env[1141]: time="2024-02-12T19:30:19.680667844Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:30:19.681146 kubelet[2002]: I0212 19:30:19.681128 2002 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:30:20.325307 kubelet[2002]: I0212 19:30:20.325250 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:20.330599 systemd[1]: Created slice kubepods-besteffort-pod2702c56a_55bc_4233_97f7_b0a0ef2a4758.slice. Feb 12 19:30:20.376364 kubelet[2002]: I0212 19:30:20.376302 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2702c56a-55bc-4233-97f7-b0a0ef2a4758-lib-modules\") pod \"kube-proxy-swqvj\" (UID: \"2702c56a-55bc-4233-97f7-b0a0ef2a4758\") " pod="kube-system/kube-proxy-swqvj" Feb 12 19:30:20.376364 kubelet[2002]: I0212 19:30:20.376357 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cjqh5\" (UniqueName: \"kubernetes.io/projected/2702c56a-55bc-4233-97f7-b0a0ef2a4758-kube-api-access-cjqh5\") pod \"kube-proxy-swqvj\" (UID: \"2702c56a-55bc-4233-97f7-b0a0ef2a4758\") " pod="kube-system/kube-proxy-swqvj" Feb 12 19:30:20.376364 kubelet[2002]: I0212 19:30:20.376379 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2702c56a-55bc-4233-97f7-b0a0ef2a4758-kube-proxy\") pod \"kube-proxy-swqvj\" (UID: \"2702c56a-55bc-4233-97f7-b0a0ef2a4758\") " pod="kube-system/kube-proxy-swqvj" Feb 12 19:30:20.376626 kubelet[2002]: I0212 19:30:20.376407 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2702c56a-55bc-4233-97f7-b0a0ef2a4758-xtables-lock\") pod \"kube-proxy-swqvj\" (UID: \"2702c56a-55bc-4233-97f7-b0a0ef2a4758\") " pod="kube-system/kube-proxy-swqvj" Feb 12 19:30:20.642427 kubelet[2002]: E0212 19:30:20.642326 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:20.643055 env[1141]: time="2024-02-12T19:30:20.643015338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-swqvj,Uid:2702c56a-55bc-4233-97f7-b0a0ef2a4758,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:20.647972 kubelet[2002]: I0212 19:30:20.647938 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:20.652945 systemd[1]: Created slice kubepods-besteffort-podefa9ff2b_e040_4843_b525_1c36ff7aff51.slice. Feb 12 19:30:20.663950 env[1141]: time="2024-02-12T19:30:20.663832609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:20.663950 env[1141]: time="2024-02-12T19:30:20.663884733Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:20.663950 env[1141]: time="2024-02-12T19:30:20.663895894Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:20.664358 env[1141]: time="2024-02-12T19:30:20.664313012Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9875196ed5c149ca41306fd51c33758506ce43e135641a85b8a0188bade06d0 pid=2097 runtime=io.containerd.runc.v2 Feb 12 19:30:20.678427 kubelet[2002]: I0212 19:30:20.678395 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9mb8v\" (UniqueName: \"kubernetes.io/projected/efa9ff2b-e040-4843-b525-1c36ff7aff51-kube-api-access-9mb8v\") pod \"tigera-operator-7ff8dc855-knpdt\" (UID: \"efa9ff2b-e040-4843-b525-1c36ff7aff51\") " pod="tigera-operator/tigera-operator-7ff8dc855-knpdt" Feb 12 19:30:20.678538 kubelet[2002]: I0212 19:30:20.678441 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/efa9ff2b-e040-4843-b525-1c36ff7aff51-var-lib-calico\") pod \"tigera-operator-7ff8dc855-knpdt\" (UID: \"efa9ff2b-e040-4843-b525-1c36ff7aff51\") " pod="tigera-operator/tigera-operator-7ff8dc855-knpdt" Feb 12 19:30:20.679156 systemd[1]: Started cri-containerd-c9875196ed5c149ca41306fd51c33758506ce43e135641a85b8a0188bade06d0.scope. Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit: BPF prog-id=112 op=LOAD Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2097 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383735313936656435633134396361343133303666643531633333 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2097 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383735313936656435633134396361343133303666643531633333 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.819000 audit: BPF prog-id=113 op=LOAD Feb 12 19:30:20.819000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2097 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383735313936656435633134396361343133303666643531633333 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit: BPF prog-id=114 op=LOAD Feb 12 19:30:20.820000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2097 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383735313936656435633134396361343133303666643531633333 Feb 12 19:30:20.820000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:30:20.820000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.820000 audit: BPF prog-id=115 op=LOAD Feb 12 19:30:20.820000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2097 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339383735313936656435633134396361343133303666643531633333 Feb 12 19:30:20.839273 env[1141]: time="2024-02-12T19:30:20.839224212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-swqvj,Uid:2702c56a-55bc-4233-97f7-b0a0ef2a4758,Namespace:kube-system,Attempt:0,} returns sandbox id \"c9875196ed5c149ca41306fd51c33758506ce43e135641a85b8a0188bade06d0\"" Feb 12 19:30:20.840589 kubelet[2002]: E0212 19:30:20.840569 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:20.844918 env[1141]: time="2024-02-12T19:30:20.844831476Z" level=info msg="CreateContainer within sandbox \"c9875196ed5c149ca41306fd51c33758506ce43e135641a85b8a0188bade06d0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:30:20.857290 env[1141]: time="2024-02-12T19:30:20.857240912Z" level=info msg="CreateContainer within sandbox \"c9875196ed5c149ca41306fd51c33758506ce43e135641a85b8a0188bade06d0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4b6ef5b33257044af48d8666a54159114facde508a1f3a6aa0e9b1c76bc218c2\"" Feb 12 19:30:20.859685 env[1141]: time="2024-02-12T19:30:20.859643248Z" level=info msg="StartContainer for \"4b6ef5b33257044af48d8666a54159114facde508a1f3a6aa0e9b1c76bc218c2\"" Feb 12 19:30:20.876443 systemd[1]: Started cri-containerd-4b6ef5b33257044af48d8666a54159114facde508a1f3a6aa0e9b1c76bc218c2.scope. Feb 12 19:30:20.920000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.920000 audit[2140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2097 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366566356233333235373034346166343864383636366135343135 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.921000 audit: BPF prog-id=116 op=LOAD Feb 12 19:30:20.921000 audit[2140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2097 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366566356233333235373034346166343864383636366135343135 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.922000 audit: BPF prog-id=117 op=LOAD Feb 12 19:30:20.922000 audit[2140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2097 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366566356233333235373034346166343864383636366135343135 Feb 12 19:30:20.923000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:30:20.923000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:20.923000 audit: BPF prog-id=118 op=LOAD Feb 12 19:30:20.923000 audit[2140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2097 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:20.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366566356233333235373034346166343864383636366135343135 Feb 12 19:30:20.939692 env[1141]: time="2024-02-12T19:30:20.939641838Z" level=info msg="StartContainer for \"4b6ef5b33257044af48d8666a54159114facde508a1f3a6aa0e9b1c76bc218c2\" returns successfully" Feb 12 19:30:20.957725 env[1141]: time="2024-02-12T19:30:20.957652657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-knpdt,Uid:efa9ff2b-e040-4843-b525-1c36ff7aff51,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:30:20.975331 env[1141]: time="2024-02-12T19:30:20.974331316Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:20.975331 env[1141]: time="2024-02-12T19:30:20.974371359Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:20.975331 env[1141]: time="2024-02-12T19:30:20.974381880Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:20.975331 env[1141]: time="2024-02-12T19:30:20.974564337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ae015952b83db6d010de6c952e8d444e4f1a0f9277ab6d19124fc783b479257 pid=2175 runtime=io.containerd.runc.v2 Feb 12 19:30:20.987464 systemd[1]: Started cri-containerd-8ae015952b83db6d010de6c952e8d444e4f1a0f9277ab6d19124fc783b479257.scope. Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.026000 audit: BPF prog-id=119 op=LOAD Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2175 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653031353935326238336462366430313064653663393532653864 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2175 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653031353935326238336462366430313064653663393532653864 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit: BPF prog-id=120 op=LOAD Feb 12 19:30:21.027000 audit[2185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2175 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653031353935326238336462366430313064653663393532653864 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit: BPF prog-id=121 op=LOAD Feb 12 19:30:21.027000 audit[2185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2175 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653031353935326238336462366430313064653663393532653864 Feb 12 19:30:21.027000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:30:21.027000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:21.027000 audit: BPF prog-id=122 op=LOAD Feb 12 19:30:21.027000 audit[2185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2175 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653031353935326238336462366430313064653663393532653864 Feb 12 19:30:21.050749 env[1141]: time="2024-02-12T19:30:21.050705634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-knpdt,Uid:efa9ff2b-e040-4843-b525-1c36ff7aff51,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8ae015952b83db6d010de6c952e8d444e4f1a0f9277ab6d19124fc783b479257\"" Feb 12 19:30:21.053699 env[1141]: time="2024-02-12T19:30:21.053656206Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:30:21.083000 audit[2230]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.083000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffe232440 a2=0 a3=ffff960906c0 items=0 ppid=2151 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:30:21.083000 audit[2229]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.083000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9bc4580 a2=0 a3=ffff95f066c0 items=0 ppid=2151 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:30:21.085000 audit[2232]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.085000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd469f560 a2=0 a3=ffffa2c916c0 items=0 ppid=2151 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:30:21.087000 audit[2233]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.087000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1750d40 a2=0 a3=ffff88eb56c0 items=0 ppid=2151 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:30:21.088000 audit[2235]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.088000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd23e88e0 a2=0 a3=ffffbb6806c0 items=0 ppid=2151 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:30:21.089000 audit[2234]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.089000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2656040 a2=0 a3=ffff96d8a6c0 items=0 ppid=2151 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:30:21.141032 kubelet[2002]: E0212 19:30:21.140991 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:21.149622 kubelet[2002]: I0212 19:30:21.149563 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-swqvj" podStartSLOduration=1.149530548 podCreationTimestamp="2024-02-12 19:30:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:30:21.149360534 +0000 UTC m=+15.166417076" watchObservedRunningTime="2024-02-12 19:30:21.149530548 +0000 UTC m=+15.166587050" Feb 12 19:30:21.186000 audit[2237]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.186000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffeea4d5a0 a2=0 a3=ffff95ea56c0 items=0 ppid=2151 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:30:21.188000 audit[2239]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.188000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc7698fd0 a2=0 a3=ffff866056c0 items=0 ppid=2151 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:30:21.192000 audit[2242]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.192000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd539d570 a2=0 a3=ffffaa4a36c0 items=0 ppid=2151 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:30:21.193000 audit[2243]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.193000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd879d1a0 a2=0 a3=ffffa731b6c0 items=0 ppid=2151 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:30:21.195000 audit[2245]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.195000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdc103070 a2=0 a3=ffff9b1726c0 items=0 ppid=2151 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:30:21.196000 audit[2246]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.196000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd33b10a0 a2=0 a3=ffff986766c0 items=0 ppid=2151 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:30:21.198000 audit[2248]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.198000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd1817610 a2=0 a3=ffffa46926c0 items=0 ppid=2151 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:30:21.201000 audit[2251]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.201000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd1ee65d0 a2=0 a3=ffffa0c706c0 items=0 ppid=2151 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:30:21.202000 audit[2252]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.202000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4dd9450 a2=0 a3=ffff8787a6c0 items=0 ppid=2151 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:30:21.205000 audit[2254]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.205000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee3ca680 a2=0 a3=ffff9ff946c0 items=0 ppid=2151 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:30:21.205000 audit[2255]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.205000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9e54fd0 a2=0 a3=ffff906366c0 items=0 ppid=2151 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:30:21.208000 audit[2257]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.208000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe9c48510 a2=0 a3=ffffa9afe6c0 items=0 ppid=2151 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:30:21.211000 audit[2260]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.211000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff249da30 a2=0 a3=ffffb54ef6c0 items=0 ppid=2151 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:30:21.215000 audit[2263]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.215000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe133fa40 a2=0 a3=ffffbaaa66c0 items=0 ppid=2151 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:30:21.217000 audit[2264]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.217000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff5147570 a2=0 a3=ffffa01376c0 items=0 ppid=2151 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:30:21.219000 audit[2266]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.219000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc766cde0 a2=0 a3=ffff82b5c6c0 items=0 ppid=2151 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:21.223000 audit[2269]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.223000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe9907080 a2=0 a3=ffff942006c0 items=0 ppid=2151 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:21.228000 audit[2274]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.228000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe65474f0 a2=0 a3=ffff967656c0 items=0 ppid=2151 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:30:21.231000 audit[2276]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:30:21.231000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd89105d0 a2=0 a3=ffffb565e6c0 items=0 ppid=2151 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:30:21.242000 audit[2278]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:21.242000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff7f65e20 a2=0 a3=ffffa26726c0 items=0 ppid=2151 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:21.247000 audit[2278]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:21.247000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff7f65e20 a2=0 a3=ffffa26726c0 items=0 ppid=2151 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:21.259000 audit[2285]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:21.259000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffffffc9f50 a2=0 a3=ffff99da96c0 items=0 ppid=2151 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:21.259000 audit[2285]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:21.259000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffffc9f50 a2=0 a3=ffff99da96c0 items=0 ppid=2151 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:21.275000 audit[2286]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.275000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff84b3f90 a2=0 a3=ffffb2f886c0 items=0 ppid=2151 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:30:21.278000 audit[2288]: NETFILTER_CFG table=filter:68 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.278000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffecae4390 a2=0 a3=ffffabfe86c0 items=0 ppid=2151 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:30:21.288000 audit[2291]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.288000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff6c6b430 a2=0 a3=ffff92c596c0 items=0 ppid=2151 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:30:21.290000 audit[2292]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.290000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9d849a0 a2=0 a3=ffffa32ae6c0 items=0 ppid=2151 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:30:21.292000 audit[2294]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.292000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd529bb10 a2=0 a3=ffff990fa6c0 items=0 ppid=2151 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:30:21.294000 audit[2295]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.294000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda91af80 a2=0 a3=ffffb796a6c0 items=0 ppid=2151 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:30:21.296000 audit[2297]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.296000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa139360 a2=0 a3=ffff941046c0 items=0 ppid=2151 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:30:21.302000 audit[2300]: NETFILTER_CFG table=filter:74 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.302000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd2162c90 a2=0 a3=ffff8a79e6c0 items=0 ppid=2151 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:30:21.304000 audit[2301]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.304000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8a95330 a2=0 a3=ffff9c5936c0 items=0 ppid=2151 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:30:21.307000 audit[2303]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.307000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa2a4290 a2=0 a3=ffffa69de6c0 items=0 ppid=2151 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:30:21.308000 audit[2304]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.308000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8bbbab0 a2=0 a3=ffff841e96c0 items=0 ppid=2151 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:30:21.313000 audit[2306]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.313000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc36d4680 a2=0 a3=ffffa1a856c0 items=0 ppid=2151 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:30:21.318000 audit[2309]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.318000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd3126d10 a2=0 a3=ffff986cc6c0 items=0 ppid=2151 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:30:21.321000 audit[2312]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.321000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf938cd0 a2=0 a3=ffffa10d36c0 items=0 ppid=2151 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:30:21.324000 audit[2313]: NETFILTER_CFG table=nat:81 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.324000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc0fb7c80 a2=0 a3=ffffad0496c0 items=0 ppid=2151 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:30:21.326000 audit[2315]: NETFILTER_CFG table=nat:82 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.326000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffa7d2b30 a2=0 a3=ffff836656c0 items=0 ppid=2151 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:21.329000 audit[2318]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.329000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe5927db0 a2=0 a3=ffff86cad6c0 items=0 ppid=2151 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:30:21.330000 audit[2319]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.330000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf9200f0 a2=0 a3=ffffa7d936c0 items=0 ppid=2151 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:30:21.334000 audit[2321]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.334000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc6325b20 a2=0 a3=ffffaea4a6c0 items=0 ppid=2151 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:30:21.337000 audit[2324]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.337000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc4eca8e0 a2=0 a3=ffff8df2c6c0 items=0 ppid=2151 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:30:21.339000 audit[2325]: NETFILTER_CFG table=nat:87 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.339000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc24e76d0 a2=0 a3=ffffa7c2c6c0 items=0 ppid=2151 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:30:21.341000 audit[2327]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:30:21.341000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd87e7850 a2=0 a3=ffffafc866c0 items=0 ppid=2151 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:30:21.344000 audit[2329]: NETFILTER_CFG table=filter:89 family=10 entries=3 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:30:21.344000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd171a030 a2=0 a3=ffffa9ed06c0 items=0 ppid=2151 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.344000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:21.345000 audit[2329]: NETFILTER_CFG table=nat:90 family=10 entries=7 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:30:21.345000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffd171a030 a2=0 a3=ffffa9ed06c0 items=0 ppid=2151 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:21.345000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:21.492612 systemd[1]: run-containerd-runc-k8s.io-c9875196ed5c149ca41306fd51c33758506ce43e135641a85b8a0188bade06d0-runc.tMhfS2.mount: Deactivated successfully. Feb 12 19:30:21.916987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2543692985.mount: Deactivated successfully. Feb 12 19:30:22.456102 env[1141]: time="2024-02-12T19:30:22.456048634Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:22.457288 env[1141]: time="2024-02-12T19:30:22.457248971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:22.458720 env[1141]: time="2024-02-12T19:30:22.458692729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:22.459960 env[1141]: time="2024-02-12T19:30:22.459928749Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:22.460605 env[1141]: time="2024-02-12T19:30:22.460577841Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 19:30:22.464347 env[1141]: time="2024-02-12T19:30:22.464310504Z" level=info msg="CreateContainer within sandbox \"8ae015952b83db6d010de6c952e8d444e4f1a0f9277ab6d19124fc783b479257\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:30:22.474332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4213081972.mount: Deactivated successfully. Feb 12 19:30:22.476117 env[1141]: time="2024-02-12T19:30:22.476073658Z" level=info msg="CreateContainer within sandbox \"8ae015952b83db6d010de6c952e8d444e4f1a0f9277ab6d19124fc783b479257\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ce1c873d95179931d53f4a65c9003f4306c8f6a8d57d9ffc48c3a9e1740b32e9\"" Feb 12 19:30:22.476580 env[1141]: time="2024-02-12T19:30:22.476553217Z" level=info msg="StartContainer for \"ce1c873d95179931d53f4a65c9003f4306c8f6a8d57d9ffc48c3a9e1740b32e9\"" Feb 12 19:30:22.497271 systemd[1]: Started cri-containerd-ce1c873d95179931d53f4a65c9003f4306c8f6a8d57d9ffc48c3a9e1740b32e9.scope. Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.528000 audit: BPF prog-id=123 op=LOAD Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2175 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:22.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365316338373364393531373939333164353366346136356339303033 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2175 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:22.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365316338373364393531373939333164353366346136356339303033 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit: BPF prog-id=124 op=LOAD Feb 12 19:30:22.529000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2175 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:22.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365316338373364393531373939333164353366346136356339303033 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit: BPF prog-id=125 op=LOAD Feb 12 19:30:22.529000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2175 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:22.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365316338373364393531373939333164353366346136356339303033 Feb 12 19:30:22.529000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:30:22.529000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:22.529000 audit: BPF prog-id=126 op=LOAD Feb 12 19:30:22.529000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2175 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:22.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365316338373364393531373939333164353366346136356339303033 Feb 12 19:30:22.549172 env[1141]: time="2024-02-12T19:30:22.549090419Z" level=info msg="StartContainer for \"ce1c873d95179931d53f4a65c9003f4306c8f6a8d57d9ffc48c3a9e1740b32e9\" returns successfully" Feb 12 19:30:22.976186 update_engine[1131]: I0212 19:30:22.976131 1131 update_attempter.cc:509] Updating boot flags... Feb 12 19:30:25.120000 audit[2382]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.123379 kernel: kauditd_printk_skb: 378 callbacks suppressed Feb 12 19:30:25.123454 kernel: audit: type=1325 audit(1707766225.120:1030): table=filter:91 family=2 entries=15 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.120000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffffe1190c0 a2=0 a3=ffff8b9c36c0 items=0 ppid=2151 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.127744 kernel: audit: type=1300 audit(1707766225.120:1030): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffffe1190c0 a2=0 a3=ffff8b9c36c0 items=0 ppid=2151 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.127799 kernel: audit: type=1327 audit(1707766225.120:1030): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.122000 audit[2382]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.122000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffe1190c0 a2=0 a3=ffff8b9c36c0 items=0 ppid=2151 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.136537 kernel: audit: type=1325 audit(1707766225.122:1031): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.136613 kernel: audit: type=1300 audit(1707766225.122:1031): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffe1190c0 a2=0 a3=ffff8b9c36c0 items=0 ppid=2151 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.136640 kernel: audit: type=1327 audit(1707766225.122:1031): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.135000 audit[2384]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.135000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe73c4d70 a2=0 a3=ffff9ceee6c0 items=0 ppid=2151 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.148451 kernel: audit: type=1325 audit(1707766225.135:1032): table=filter:93 family=2 entries=16 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.148599 kernel: audit: type=1300 audit(1707766225.135:1032): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe73c4d70 a2=0 a3=ffff9ceee6c0 items=0 ppid=2151 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.148633 kernel: audit: type=1327 audit(1707766225.135:1032): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.142000 audit[2384]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.142000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe73c4d70 a2=0 a3=ffff9ceee6c0 items=0 ppid=2151 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:25.157891 kernel: audit: type=1325 audit(1707766225.142:1033): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:25.251357 kubelet[2002]: I0212 19:30:25.251310 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-knpdt" podStartSLOduration=3.84208411 podCreationTimestamp="2024-02-12 19:30:20 +0000 UTC" firstStartedPulling="2024-02-12 19:30:21.051721441 +0000 UTC m=+15.068777943" lastFinishedPulling="2024-02-12 19:30:22.460910588 +0000 UTC m=+16.477967130" observedRunningTime="2024-02-12 19:30:23.152986583 +0000 UTC m=+17.170043125" watchObservedRunningTime="2024-02-12 19:30:25.251273297 +0000 UTC m=+19.268329839" Feb 12 19:30:25.251987 kubelet[2002]: I0212 19:30:25.251962 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:25.260771 systemd[1]: Created slice kubepods-besteffort-podf933b0ab_8012_478d_995b_8e66200cce5b.slice. Feb 12 19:30:25.296234 kubelet[2002]: I0212 19:30:25.296192 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:25.303160 systemd[1]: Created slice kubepods-besteffort-pode3f9f39e_3d78_4311_8b32_551b89806d57.slice. Feb 12 19:30:25.312079 kubelet[2002]: I0212 19:30:25.312038 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-cni-net-dir\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312079 kubelet[2002]: I0212 19:30:25.312085 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-cni-log-dir\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312273 kubelet[2002]: I0212 19:30:25.312106 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f933b0ab-8012-478d-995b-8e66200cce5b-tigera-ca-bundle\") pod \"calico-typha-79f5d65fb6-fztlv\" (UID: \"f933b0ab-8012-478d-995b-8e66200cce5b\") " pod="calico-system/calico-typha-79f5d65fb6-fztlv" Feb 12 19:30:25.312273 kubelet[2002]: I0212 19:30:25.312128 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e3f9f39e-3d78-4311-8b32-551b89806d57-tigera-ca-bundle\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312273 kubelet[2002]: I0212 19:30:25.312150 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-var-run-calico\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312273 kubelet[2002]: I0212 19:30:25.312169 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-flexvol-driver-host\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312273 kubelet[2002]: I0212 19:30:25.312190 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gj7fg\" (UniqueName: \"kubernetes.io/projected/f933b0ab-8012-478d-995b-8e66200cce5b-kube-api-access-gj7fg\") pod \"calico-typha-79f5d65fb6-fztlv\" (UID: \"f933b0ab-8012-478d-995b-8e66200cce5b\") " pod="calico-system/calico-typha-79f5d65fb6-fztlv" Feb 12 19:30:25.312532 kubelet[2002]: I0212 19:30:25.312207 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-xtables-lock\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312532 kubelet[2002]: I0212 19:30:25.312266 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cv86t\" (UniqueName: \"kubernetes.io/projected/e3f9f39e-3d78-4311-8b32-551b89806d57-kube-api-access-cv86t\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312532 kubelet[2002]: I0212 19:30:25.312308 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f933b0ab-8012-478d-995b-8e66200cce5b-typha-certs\") pod \"calico-typha-79f5d65fb6-fztlv\" (UID: \"f933b0ab-8012-478d-995b-8e66200cce5b\") " pod="calico-system/calico-typha-79f5d65fb6-fztlv" Feb 12 19:30:25.312532 kubelet[2002]: I0212 19:30:25.312340 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-lib-modules\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312532 kubelet[2002]: I0212 19:30:25.312370 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e3f9f39e-3d78-4311-8b32-551b89806d57-node-certs\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312655 kubelet[2002]: I0212 19:30:25.312402 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-cni-bin-dir\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312655 kubelet[2002]: I0212 19:30:25.312434 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-var-lib-calico\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.312655 kubelet[2002]: I0212 19:30:25.312488 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e3f9f39e-3d78-4311-8b32-551b89806d57-policysync\") pod \"calico-node-t9zvz\" (UID: \"e3f9f39e-3d78-4311-8b32-551b89806d57\") " pod="calico-system/calico-node-t9zvz" Feb 12 19:30:25.409801 kubelet[2002]: I0212 19:30:25.409694 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:25.409980 kubelet[2002]: E0212 19:30:25.409966 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:25.415144 kubelet[2002]: E0212 19:30:25.415103 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.415144 kubelet[2002]: W0212 19:30:25.415130 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.415144 kubelet[2002]: E0212 19:30:25.415153 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.415349 kubelet[2002]: E0212 19:30:25.415331 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.415349 kubelet[2002]: W0212 19:30:25.415341 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.415404 kubelet[2002]: E0212 19:30:25.415360 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.415568 kubelet[2002]: E0212 19:30:25.415516 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.415568 kubelet[2002]: W0212 19:30:25.415526 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.415568 kubelet[2002]: E0212 19:30:25.415541 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.415697 kubelet[2002]: E0212 19:30:25.415681 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.415697 kubelet[2002]: W0212 19:30:25.415690 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.415768 kubelet[2002]: E0212 19:30:25.415705 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.415892 kubelet[2002]: E0212 19:30:25.415877 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.415892 kubelet[2002]: W0212 19:30:25.415886 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.415969 kubelet[2002]: E0212 19:30:25.415923 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.416030 kubelet[2002]: E0212 19:30:25.416008 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.416030 kubelet[2002]: W0212 19:30:25.416023 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.416094 kubelet[2002]: E0212 19:30:25.416065 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.416165 kubelet[2002]: E0212 19:30:25.416144 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.416165 kubelet[2002]: W0212 19:30:25.416158 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.416232 kubelet[2002]: E0212 19:30:25.416200 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.416299 kubelet[2002]: E0212 19:30:25.416278 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.416299 kubelet[2002]: W0212 19:30:25.416293 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.416365 kubelet[2002]: E0212 19:30:25.416307 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.421573 kubelet[2002]: E0212 19:30:25.421545 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.421573 kubelet[2002]: W0212 19:30:25.421568 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.421688 kubelet[2002]: E0212 19:30:25.421592 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.421833 kubelet[2002]: E0212 19:30:25.421818 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.421833 kubelet[2002]: W0212 19:30:25.421830 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.421908 kubelet[2002]: E0212 19:30:25.421892 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.422044 kubelet[2002]: E0212 19:30:25.422032 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.422068 kubelet[2002]: W0212 19:30:25.422045 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.422131 kubelet[2002]: E0212 19:30:25.422117 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.422771 kubelet[2002]: E0212 19:30:25.422750 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.422771 kubelet[2002]: W0212 19:30:25.422768 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.422853 kubelet[2002]: E0212 19:30:25.422808 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.423018 kubelet[2002]: E0212 19:30:25.423006 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.423018 kubelet[2002]: W0212 19:30:25.423017 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.423073 kubelet[2002]: E0212 19:30:25.423042 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.423168 kubelet[2002]: E0212 19:30:25.423158 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.423168 kubelet[2002]: W0212 19:30:25.423167 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.423219 kubelet[2002]: E0212 19:30:25.423190 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.423330 kubelet[2002]: E0212 19:30:25.423321 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.423358 kubelet[2002]: W0212 19:30:25.423330 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.423358 kubelet[2002]: E0212 19:30:25.423352 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.423525 kubelet[2002]: E0212 19:30:25.423514 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.423550 kubelet[2002]: W0212 19:30:25.423524 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.423550 kubelet[2002]: E0212 19:30:25.423536 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.423742 kubelet[2002]: E0212 19:30:25.423731 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.423742 kubelet[2002]: W0212 19:30:25.423742 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.423803 kubelet[2002]: E0212 19:30:25.423752 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.447140 kubelet[2002]: E0212 19:30:25.447082 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.447140 kubelet[2002]: W0212 19:30:25.447103 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.447140 kubelet[2002]: E0212 19:30:25.447125 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.454906 kubelet[2002]: E0212 19:30:25.453792 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.454906 kubelet[2002]: W0212 19:30:25.453813 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.454906 kubelet[2002]: E0212 19:30:25.453840 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.507245 kubelet[2002]: E0212 19:30:25.507219 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.507245 kubelet[2002]: W0212 19:30:25.507238 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.507245 kubelet[2002]: E0212 19:30:25.507256 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.507533 kubelet[2002]: E0212 19:30:25.507456 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.507533 kubelet[2002]: W0212 19:30:25.507467 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.507533 kubelet[2002]: E0212 19:30:25.507479 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.507759 kubelet[2002]: E0212 19:30:25.507740 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.507759 kubelet[2002]: W0212 19:30:25.507756 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.507829 kubelet[2002]: E0212 19:30:25.507768 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.508971 kubelet[2002]: E0212 19:30:25.508953 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.508971 kubelet[2002]: W0212 19:30:25.508968 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.509055 kubelet[2002]: E0212 19:30:25.508984 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.509179 kubelet[2002]: E0212 19:30:25.509163 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.509179 kubelet[2002]: W0212 19:30:25.509175 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.509238 kubelet[2002]: E0212 19:30:25.509186 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.509329 kubelet[2002]: E0212 19:30:25.509307 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.509329 kubelet[2002]: W0212 19:30:25.509317 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.509329 kubelet[2002]: E0212 19:30:25.509327 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.509488 kubelet[2002]: E0212 19:30:25.509474 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.509488 kubelet[2002]: W0212 19:30:25.509485 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.509557 kubelet[2002]: E0212 19:30:25.509507 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.509647 kubelet[2002]: E0212 19:30:25.509634 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.509647 kubelet[2002]: W0212 19:30:25.509646 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.509694 kubelet[2002]: E0212 19:30:25.509656 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.509800 kubelet[2002]: E0212 19:30:25.509787 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.509842 kubelet[2002]: W0212 19:30:25.509804 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.509842 kubelet[2002]: E0212 19:30:25.509815 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.510026 kubelet[2002]: E0212 19:30:25.510012 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.510026 kubelet[2002]: W0212 19:30:25.510025 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.510095 kubelet[2002]: E0212 19:30:25.510036 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.510528 kubelet[2002]: E0212 19:30:25.510507 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.510528 kubelet[2002]: W0212 19:30:25.510521 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.510528 kubelet[2002]: E0212 19:30:25.510534 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.510718 kubelet[2002]: E0212 19:30:25.510699 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.510718 kubelet[2002]: W0212 19:30:25.510711 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.510718 kubelet[2002]: E0212 19:30:25.510721 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.510927 kubelet[2002]: E0212 19:30:25.510910 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.510927 kubelet[2002]: W0212 19:30:25.510922 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.511027 kubelet[2002]: E0212 19:30:25.510933 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.511067 kubelet[2002]: E0212 19:30:25.511053 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.511067 kubelet[2002]: W0212 19:30:25.511062 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.511119 kubelet[2002]: E0212 19:30:25.511073 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.511208 kubelet[2002]: E0212 19:30:25.511190 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.511208 kubelet[2002]: W0212 19:30:25.511199 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.511208 kubelet[2002]: E0212 19:30:25.511209 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.514533 kubelet[2002]: E0212 19:30:25.514490 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.514533 kubelet[2002]: W0212 19:30:25.514511 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.514533 kubelet[2002]: E0212 19:30:25.514524 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.514668 kubelet[2002]: I0212 19:30:25.514551 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/adc19104-1eb1-4629-b6c0-6317ec29da48-registration-dir\") pod \"csi-node-driver-25l5n\" (UID: \"adc19104-1eb1-4629-b6c0-6317ec29da48\") " pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:25.514732 kubelet[2002]: E0212 19:30:25.514706 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.514732 kubelet[2002]: W0212 19:30:25.514725 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.514787 kubelet[2002]: E0212 19:30:25.514741 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.514787 kubelet[2002]: I0212 19:30:25.514759 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/adc19104-1eb1-4629-b6c0-6317ec29da48-varrun\") pod \"csi-node-driver-25l5n\" (UID: \"adc19104-1eb1-4629-b6c0-6317ec29da48\") " pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:25.514927 kubelet[2002]: E0212 19:30:25.514912 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.514927 kubelet[2002]: W0212 19:30:25.514924 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.514990 kubelet[2002]: E0212 19:30:25.514934 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.515081 kubelet[2002]: E0212 19:30:25.515065 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.515081 kubelet[2002]: W0212 19:30:25.515074 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.515147 kubelet[2002]: E0212 19:30:25.515088 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.515278 kubelet[2002]: E0212 19:30:25.515261 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.515278 kubelet[2002]: W0212 19:30:25.515271 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.515343 kubelet[2002]: E0212 19:30:25.515284 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.515343 kubelet[2002]: I0212 19:30:25.515300 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/adc19104-1eb1-4629-b6c0-6317ec29da48-socket-dir\") pod \"csi-node-driver-25l5n\" (UID: \"adc19104-1eb1-4629-b6c0-6317ec29da48\") " pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:25.515438 kubelet[2002]: E0212 19:30:25.515423 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.515438 kubelet[2002]: W0212 19:30:25.515433 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.515515 kubelet[2002]: E0212 19:30:25.515449 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.515594 kubelet[2002]: E0212 19:30:25.515578 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.515594 kubelet[2002]: W0212 19:30:25.515591 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.515663 kubelet[2002]: E0212 19:30:25.515601 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.515756 kubelet[2002]: E0212 19:30:25.515739 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.515756 kubelet[2002]: W0212 19:30:25.515749 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.515827 kubelet[2002]: E0212 19:30:25.515765 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.515951 kubelet[2002]: E0212 19:30:25.515934 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.515951 kubelet[2002]: W0212 19:30:25.515944 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.515951 kubelet[2002]: E0212 19:30:25.515954 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.516130 kubelet[2002]: E0212 19:30:25.516108 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.516130 kubelet[2002]: W0212 19:30:25.516123 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.516130 kubelet[2002]: E0212 19:30:25.516133 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.516229 kubelet[2002]: I0212 19:30:25.516150 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/adc19104-1eb1-4629-b6c0-6317ec29da48-kubelet-dir\") pod \"csi-node-driver-25l5n\" (UID: \"adc19104-1eb1-4629-b6c0-6317ec29da48\") " pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:25.516321 kubelet[2002]: E0212 19:30:25.516301 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.516321 kubelet[2002]: W0212 19:30:25.516310 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.516321 kubelet[2002]: E0212 19:30:25.516323 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.516411 kubelet[2002]: I0212 19:30:25.516339 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qk7s7\" (UniqueName: \"kubernetes.io/projected/adc19104-1eb1-4629-b6c0-6317ec29da48-kube-api-access-qk7s7\") pod \"csi-node-driver-25l5n\" (UID: \"adc19104-1eb1-4629-b6c0-6317ec29da48\") " pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:25.516478 kubelet[2002]: E0212 19:30:25.516461 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.516478 kubelet[2002]: W0212 19:30:25.516471 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.516556 kubelet[2002]: E0212 19:30:25.516485 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.516629 kubelet[2002]: E0212 19:30:25.516611 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.516629 kubelet[2002]: W0212 19:30:25.516620 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.516629 kubelet[2002]: E0212 19:30:25.516630 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.516788 kubelet[2002]: E0212 19:30:25.516771 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.516788 kubelet[2002]: W0212 19:30:25.516781 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.516788 kubelet[2002]: E0212 19:30:25.516791 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.516938 kubelet[2002]: E0212 19:30:25.516923 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.516938 kubelet[2002]: W0212 19:30:25.516932 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.516938 kubelet[2002]: E0212 19:30:25.516941 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.563292 kubelet[2002]: E0212 19:30:25.563249 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:25.563795 env[1141]: time="2024-02-12T19:30:25.563755528Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79f5d65fb6-fztlv,Uid:f933b0ab-8012-478d-995b-8e66200cce5b,Namespace:calico-system,Attempt:0,}" Feb 12 19:30:25.607038 kubelet[2002]: E0212 19:30:25.607008 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:25.607663 env[1141]: time="2024-02-12T19:30:25.607411618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t9zvz,Uid:e3f9f39e-3d78-4311-8b32-551b89806d57,Namespace:calico-system,Attempt:0,}" Feb 12 19:30:25.617899 kubelet[2002]: E0212 19:30:25.617872 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.618028 kubelet[2002]: W0212 19:30:25.617963 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.618028 kubelet[2002]: E0212 19:30:25.617989 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.618329 kubelet[2002]: E0212 19:30:25.618303 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.618329 kubelet[2002]: W0212 19:30:25.618320 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.618446 kubelet[2002]: E0212 19:30:25.618339 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.618613 kubelet[2002]: E0212 19:30:25.618596 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.618613 kubelet[2002]: W0212 19:30:25.618608 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.618692 kubelet[2002]: E0212 19:30:25.618622 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.618836 kubelet[2002]: E0212 19:30:25.618800 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.618836 kubelet[2002]: W0212 19:30:25.618808 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.618836 kubelet[2002]: E0212 19:30:25.618821 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.619931 kubelet[2002]: E0212 19:30:25.619137 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.619931 kubelet[2002]: W0212 19:30:25.619168 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.619931 kubelet[2002]: E0212 19:30:25.619217 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.622376 kubelet[2002]: E0212 19:30:25.622098 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.622376 kubelet[2002]: W0212 19:30:25.622114 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.622376 kubelet[2002]: E0212 19:30:25.622230 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.624562 kubelet[2002]: E0212 19:30:25.623654 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.624562 kubelet[2002]: W0212 19:30:25.623671 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.624562 kubelet[2002]: E0212 19:30:25.623775 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.626533 kubelet[2002]: E0212 19:30:25.626511 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.626533 kubelet[2002]: W0212 19:30:25.626528 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.626827 kubelet[2002]: E0212 19:30:25.626805 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.626827 kubelet[2002]: W0212 19:30:25.626819 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.626998 kubelet[2002]: E0212 19:30:25.626974 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.627049 kubelet[2002]: E0212 19:30:25.627008 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.627146 env[1141]: time="2024-02-12T19:30:25.626811253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:25.627146 env[1141]: time="2024-02-12T19:30:25.627127715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:25.627286 env[1141]: time="2024-02-12T19:30:25.627256924Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:25.627599 env[1141]: time="2024-02-12T19:30:25.627536824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562 pid=2452 runtime=io.containerd.runc.v2 Feb 12 19:30:25.628904 kubelet[2002]: E0212 19:30:25.628881 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.628904 kubelet[2002]: W0212 19:30:25.628897 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.629042 kubelet[2002]: E0212 19:30:25.628969 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.630286 kubelet[2002]: E0212 19:30:25.630253 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.630286 kubelet[2002]: W0212 19:30:25.630269 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.630393 kubelet[2002]: E0212 19:30:25.630338 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.630869 env[1141]: time="2024-02-12T19:30:25.630787931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:25.630956 env[1141]: time="2024-02-12T19:30:25.630891738Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:25.630956 env[1141]: time="2024-02-12T19:30:25.630922900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:25.631125 kubelet[2002]: E0212 19:30:25.631084 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.631125 kubelet[2002]: W0212 19:30:25.631111 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.631230 kubelet[2002]: E0212 19:30:25.631214 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.631700 kubelet[2002]: E0212 19:30:25.631677 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.631700 kubelet[2002]: W0212 19:30:25.631694 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.631807 kubelet[2002]: E0212 19:30:25.631734 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.631853 env[1141]: time="2024-02-12T19:30:25.631132795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b32be7524df06c46457710fec2394b6e8df003711c98a9b35307aa890d9690c9 pid=2469 runtime=io.containerd.runc.v2 Feb 12 19:30:25.631929 kubelet[2002]: E0212 19:30:25.631902 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.631929 kubelet[2002]: W0212 19:30:25.631912 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.632044 kubelet[2002]: E0212 19:30:25.631942 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.632091 kubelet[2002]: E0212 19:30:25.632071 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.632091 kubelet[2002]: W0212 19:30:25.632080 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.632145 kubelet[2002]: E0212 19:30:25.632112 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.632247 kubelet[2002]: E0212 19:30:25.632233 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.632247 kubelet[2002]: W0212 19:30:25.632244 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.632320 kubelet[2002]: E0212 19:30:25.632273 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.632413 kubelet[2002]: E0212 19:30:25.632400 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.632413 kubelet[2002]: W0212 19:30:25.632410 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.632479 kubelet[2002]: E0212 19:30:25.632442 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.632793 kubelet[2002]: E0212 19:30:25.632775 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.632793 kubelet[2002]: W0212 19:30:25.632790 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.632903 kubelet[2002]: E0212 19:30:25.632808 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.633163 kubelet[2002]: E0212 19:30:25.633123 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.633163 kubelet[2002]: W0212 19:30:25.633155 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.633790 kubelet[2002]: E0212 19:30:25.633760 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.633850 kubelet[2002]: W0212 19:30:25.633797 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.633914 kubelet[2002]: E0212 19:30:25.633885 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.634064 kubelet[2002]: E0212 19:30:25.634047 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.634064 kubelet[2002]: W0212 19:30:25.634060 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.634187 kubelet[2002]: E0212 19:30:25.634170 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.634365 kubelet[2002]: E0212 19:30:25.634337 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.634365 kubelet[2002]: W0212 19:30:25.634354 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.634463 kubelet[2002]: E0212 19:30:25.634448 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.634546 kubelet[2002]: E0212 19:30:25.634530 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.634546 kubelet[2002]: W0212 19:30:25.634540 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.634626 kubelet[2002]: E0212 19:30:25.634617 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.634701 kubelet[2002]: E0212 19:30:25.634686 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.634701 kubelet[2002]: W0212 19:30:25.634697 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.634772 kubelet[2002]: E0212 19:30:25.634714 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.634907 kubelet[2002]: E0212 19:30:25.634884 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.636018 kubelet[2002]: E0212 19:30:25.635994 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.636018 kubelet[2002]: W0212 19:30:25.636011 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.636018 kubelet[2002]: E0212 19:30:25.636026 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.646493 kubelet[2002]: E0212 19:30:25.646463 2002 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:30:25.646493 kubelet[2002]: W0212 19:30:25.646486 2002 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:30:25.646779 kubelet[2002]: E0212 19:30:25.646520 2002 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:30:25.649771 systemd[1]: Started cri-containerd-43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562.scope. Feb 12 19:30:25.670592 systemd[1]: Started cri-containerd-b32be7524df06c46457710fec2394b6e8df003711c98a9b35307aa890d9690c9.scope. Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit: BPF prog-id=127 op=LOAD Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2452 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653030313139396139356230313063343535376362383333373939 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2452 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653030313139396139356230313063343535376362383333373939 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit: BPF prog-id=128 op=LOAD Feb 12 19:30:25.710000 audit[2476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2452 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653030313139396139356230313063343535376362383333373939 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit: BPF prog-id=129 op=LOAD Feb 12 19:30:25.710000 audit[2476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2452 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653030313139396139356230313063343535376362383333373939 Feb 12 19:30:25.710000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:30:25.710000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { perfmon } for pid=2476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit[2476]: AVC avc: denied { bpf } for pid=2476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.710000 audit: BPF prog-id=130 op=LOAD Feb 12 19:30:25.710000 audit[2476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2452 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653030313139396139356230313063343535376362383333373939 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit: BPF prog-id=131 op=LOAD Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2469 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326265373532346466303663343634353737313066656332333934 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2469 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326265373532346466303663343634353737313066656332333934 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit: BPF prog-id=132 op=LOAD Feb 12 19:30:25.716000 audit[2494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2469 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326265373532346466303663343634353737313066656332333934 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit: BPF prog-id=133 op=LOAD Feb 12 19:30:25.716000 audit[2494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2469 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326265373532346466303663343634353737313066656332333934 Feb 12 19:30:25.716000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:30:25.716000 audit: BPF prog-id=132 op=UNLOAD Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:25.716000 audit: BPF prog-id=134 op=LOAD Feb 12 19:30:25.716000 audit[2494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2469 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:25.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326265373532346466303663343634353737313066656332333934 Feb 12 19:30:25.727624 env[1141]: time="2024-02-12T19:30:25.727578853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t9zvz,Uid:e3f9f39e-3d78-4311-8b32-551b89806d57,Namespace:calico-system,Attempt:0,} returns sandbox id \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\"" Feb 12 19:30:25.728290 kubelet[2002]: E0212 19:30:25.728266 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:25.729794 env[1141]: time="2024-02-12T19:30:25.729354537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:30:25.742805 env[1141]: time="2024-02-12T19:30:25.742614063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79f5d65fb6-fztlv,Uid:f933b0ab-8012-478d-995b-8e66200cce5b,Namespace:calico-system,Attempt:0,} returns sandbox id \"b32be7524df06c46457710fec2394b6e8df003711c98a9b35307aa890d9690c9\"" Feb 12 19:30:25.743617 kubelet[2002]: E0212 19:30:25.743424 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:26.159000 audit[2546]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:26.159000 audit[2546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe3096e10 a2=0 a3=ffffa63ba6c0 items=0 ppid=2151 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:26.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:26.160000 audit[2546]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:26.160000 audit[2546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe3096e10 a2=0 a3=ffffa63ba6c0 items=0 ppid=2151 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:26.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:27.088062 kubelet[2002]: E0212 19:30:27.088021 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:27.216138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2112054374.mount: Deactivated successfully. Feb 12 19:30:27.292219 env[1141]: time="2024-02-12T19:30:27.292151105Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:27.294124 env[1141]: time="2024-02-12T19:30:27.294092828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:27.295585 env[1141]: time="2024-02-12T19:30:27.295547720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:27.297142 env[1141]: time="2024-02-12T19:30:27.297115940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:27.297521 env[1141]: time="2024-02-12T19:30:27.297491724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:30:27.298417 env[1141]: time="2024-02-12T19:30:27.298374660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:30:27.299717 env[1141]: time="2024-02-12T19:30:27.299489691Z" level=info msg="CreateContainer within sandbox \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:30:27.312621 env[1141]: time="2024-02-12T19:30:27.312563881Z" level=info msg="CreateContainer within sandbox \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6\"" Feb 12 19:30:27.313435 env[1141]: time="2024-02-12T19:30:27.313406134Z" level=info msg="StartContainer for \"657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6\"" Feb 12 19:30:27.330121 systemd[1]: Started cri-containerd-657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6.scope. Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2452 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:27.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376334653565373739316537646539333733643234653231386239 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit: BPF prog-id=135 op=LOAD Feb 12 19:30:27.352000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2452 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:27.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376334653565373739316537646539333733643234653231386239 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit: BPF prog-id=136 op=LOAD Feb 12 19:30:27.352000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2452 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:27.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376334653565373739316537646539333733643234653231386239 Feb 12 19:30:27.352000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:30:27.352000 audit: BPF prog-id=135 op=UNLOAD Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:27.352000 audit: BPF prog-id=137 op=LOAD Feb 12 19:30:27.352000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2452 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:27.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635376334653565373739316537646539333733643234653231386239 Feb 12 19:30:27.377185 systemd[1]: cri-containerd-657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6.scope: Deactivated successfully. Feb 12 19:30:27.378731 env[1141]: time="2024-02-12T19:30:27.378631276Z" level=info msg="StartContainer for \"657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6\" returns successfully" Feb 12 19:30:27.381000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:30:27.413265 env[1141]: time="2024-02-12T19:30:27.413211752Z" level=info msg="shim disconnected" id=657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6 Feb 12 19:30:27.413495 env[1141]: time="2024-02-12T19:30:27.413475248Z" level=warning msg="cleaning up after shim disconnected" id=657c4e5e7791e7de9373d24e218b9761cef8ed5a0091cfa30b2ea6d92c9a23c6 namespace=k8s.io Feb 12 19:30:27.413554 env[1141]: time="2024-02-12T19:30:27.413540893Z" level=info msg="cleaning up dead shim" Feb 12 19:30:27.427732 env[1141]: time="2024-02-12T19:30:27.427681070Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:30:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2598 runtime=io.containerd.runc.v2\n" Feb 12 19:30:28.156239 kubelet[2002]: E0212 19:30:28.155990 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:28.481206 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1418614818.mount: Deactivated successfully. Feb 12 19:30:29.088010 kubelet[2002]: E0212 19:30:29.087978 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:29.945870 env[1141]: time="2024-02-12T19:30:29.945810512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:29.947966 env[1141]: time="2024-02-12T19:30:29.947921354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:29.953735 env[1141]: time="2024-02-12T19:30:29.951646490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:29.958123 env[1141]: time="2024-02-12T19:30:29.958070702Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:29.958598 env[1141]: time="2024-02-12T19:30:29.958562290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 19:30:29.959708 env[1141]: time="2024-02-12T19:30:29.959675595Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:30:29.972269 env[1141]: time="2024-02-12T19:30:29.972215281Z" level=info msg="CreateContainer within sandbox \"b32be7524df06c46457710fec2394b6e8df003711c98a9b35307aa890d9690c9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:30:29.989943 env[1141]: time="2024-02-12T19:30:29.989834981Z" level=info msg="CreateContainer within sandbox \"b32be7524df06c46457710fec2394b6e8df003711c98a9b35307aa890d9690c9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5096a040276ae7fa227563aa4433e52ff06db1ced2e25f9cdb5ff3b8cdcc8de8\"" Feb 12 19:30:29.990719 env[1141]: time="2024-02-12T19:30:29.990530821Z" level=info msg="StartContainer for \"5096a040276ae7fa227563aa4433e52ff06db1ced2e25f9cdb5ff3b8cdcc8de8\"" Feb 12 19:30:30.013685 systemd[1]: Started cri-containerd-5096a040276ae7fa227563aa4433e52ff06db1ced2e25f9cdb5ff3b8cdcc8de8.scope. Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.083000 audit: BPF prog-id=138 op=LOAD Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2469 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:30.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530393661303430323736616537666132323735363361613434333365 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2469 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:30.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530393661303430323736616537666132323735363361613434333365 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit: BPF prog-id=139 op=LOAD Feb 12 19:30:30.084000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2469 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:30.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530393661303430323736616537666132323735363361613434333365 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit: BPF prog-id=140 op=LOAD Feb 12 19:30:30.084000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2469 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:30.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530393661303430323736616537666132323735363361613434333365 Feb 12 19:30:30.084000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:30:30.084000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:30.084000 audit: BPF prog-id=141 op=LOAD Feb 12 19:30:30.084000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2469 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:30.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530393661303430323736616537666132323735363361613434333365 Feb 12 19:30:30.109446 env[1141]: time="2024-02-12T19:30:30.109394309Z" level=info msg="StartContainer for \"5096a040276ae7fa227563aa4433e52ff06db1ced2e25f9cdb5ff3b8cdcc8de8\" returns successfully" Feb 12 19:30:30.160623 kubelet[2002]: E0212 19:30:30.160588 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:30.173669 kubelet[2002]: I0212 19:30:30.173635 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-79f5d65fb6-fztlv" podStartSLOduration=0.958551024 podCreationTimestamp="2024-02-12 19:30:25 +0000 UTC" firstStartedPulling="2024-02-12 19:30:25.743919954 +0000 UTC m=+19.760976456" lastFinishedPulling="2024-02-12 19:30:29.958961273 +0000 UTC m=+23.976017855" observedRunningTime="2024-02-12 19:30:30.173201161 +0000 UTC m=+24.190257703" watchObservedRunningTime="2024-02-12 19:30:30.173592423 +0000 UTC m=+24.190648965" Feb 12 19:30:31.076768 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount596018404.mount: Deactivated successfully. Feb 12 19:30:31.088281 kubelet[2002]: E0212 19:30:31.087948 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:31.161851 kubelet[2002]: I0212 19:30:31.161807 2002 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:30:31.162723 kubelet[2002]: E0212 19:30:31.162691 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:32.645238 kubelet[2002]: I0212 19:30:32.645058 2002 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:30:32.645886 kubelet[2002]: E0212 19:30:32.645846 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:32.702000 audit[2658]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:32.705799 kernel: kauditd_printk_skb: 223 callbacks suppressed Feb 12 19:30:32.705910 kernel: audit: type=1325 audit(1707766232.702:1097): table=filter:97 family=2 entries=15 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:32.705944 kernel: audit: type=1300 audit(1707766232.702:1097): arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe1c16640 a2=0 a3=ffffa18ce6c0 items=0 ppid=2151 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:32.702000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe1c16640 a2=0 a3=ffffa18ce6c0 items=0 ppid=2151 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:32.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:32.711438 kernel: audit: type=1327 audit(1707766232.702:1097): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:32.702000 audit[2658]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:32.702000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe1c16640 a2=0 a3=ffffa18ce6c0 items=0 ppid=2151 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:32.720661 kernel: audit: type=1325 audit(1707766232.702:1098): table=nat:98 family=2 entries=19 op=nft_register_chain pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:32.720730 kernel: audit: type=1300 audit(1707766232.702:1098): arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe1c16640 a2=0 a3=ffffa18ce6c0 items=0 ppid=2151 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:32.720754 kernel: audit: type=1327 audit(1707766232.702:1098): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:32.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:33.087696 kubelet[2002]: E0212 19:30:33.087354 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:33.166490 kubelet[2002]: E0212 19:30:33.166458 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:35.088053 kubelet[2002]: E0212 19:30:35.087986 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:35.208464 env[1141]: time="2024-02-12T19:30:35.208411132Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:35.210320 env[1141]: time="2024-02-12T19:30:35.210287216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:35.212146 env[1141]: time="2024-02-12T19:30:35.212111018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:35.213376 env[1141]: time="2024-02-12T19:30:35.213336553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:35.213901 env[1141]: time="2024-02-12T19:30:35.213853456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:30:35.217042 env[1141]: time="2024-02-12T19:30:35.217001157Z" level=info msg="CreateContainer within sandbox \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:30:35.236202 env[1141]: time="2024-02-12T19:30:35.236148816Z" level=info msg="CreateContainer within sandbox \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a\"" Feb 12 19:30:35.236702 env[1141]: time="2024-02-12T19:30:35.236678080Z" level=info msg="StartContainer for \"9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a\"" Feb 12 19:30:35.267358 systemd[1]: Started cri-containerd-9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a.scope. Feb 12 19:30:35.321000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.321000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2452 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:35.327563 kernel: audit: type=1400 audit(1707766235.321:1099): avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327648 kernel: audit: type=1300 audit(1707766235.321:1099): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2452 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:35.327673 kernel: audit: type=1327 audit(1707766235.321:1099): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353964373838663763316232623732366163373239353835383564 Feb 12 19:30:35.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353964373838663763316232623732366163373239353835383564 Feb 12 19:30:35.330132 kernel: audit: type=1400 audit(1707766235.322:1100): avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.322000 audit: BPF prog-id=142 op=LOAD Feb 12 19:30:35.322000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2452 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:35.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353964373838663763316232623732366163373239353835383564 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.323000 audit: BPF prog-id=143 op=LOAD Feb 12 19:30:35.323000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2452 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:35.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353964373838663763316232623732366163373239353835383564 Feb 12 19:30:35.327000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:30:35.327000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:35.327000 audit: BPF prog-id=144 op=LOAD Feb 12 19:30:35.327000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2452 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:35.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936353964373838663763316232623732366163373239353835383564 Feb 12 19:30:35.347157 env[1141]: time="2024-02-12T19:30:35.347042712Z" level=info msg="StartContainer for \"9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a\" returns successfully" Feb 12 19:30:35.924752 systemd[1]: cri-containerd-9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a.scope: Deactivated successfully. Feb 12 19:30:35.931000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:30:35.941242 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a-rootfs.mount: Deactivated successfully. Feb 12 19:30:35.949632 kubelet[2002]: I0212 19:30:35.949606 2002 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:30:36.025823 kubelet[2002]: I0212 19:30:36.025772 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:36.026060 kubelet[2002]: I0212 19:30:36.025945 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:36.026060 kubelet[2002]: I0212 19:30:36.026030 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:30:36.031726 systemd[1]: Created slice kubepods-besteffort-podc9935352_f103_4b61_876e_54da2abe1d04.slice. Feb 12 19:30:36.036956 systemd[1]: Created slice kubepods-burstable-pod44ac8a30_2ae8_4125_ace8_535d21d0b8d3.slice. Feb 12 19:30:36.041682 systemd[1]: Created slice kubepods-burstable-pod50dd4007_e567_44a4_8534_c0500ed637cc.slice. Feb 12 19:30:36.098397 env[1141]: time="2024-02-12T19:30:36.098351933Z" level=info msg="shim disconnected" id=9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a Feb 12 19:30:36.098397 env[1141]: time="2024-02-12T19:30:36.098392135Z" level=warning msg="cleaning up after shim disconnected" id=9659d788f7c1b2b726ac72958585d1eb7a0942c9fcd2248afed72df277013d8a namespace=k8s.io Feb 12 19:30:36.098397 env[1141]: time="2024-02-12T19:30:36.098401295Z" level=info msg="cleaning up dead shim" Feb 12 19:30:36.105837 env[1141]: time="2024-02-12T19:30:36.105796814Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:30:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2716 runtime=io.containerd.runc.v2\n" Feb 12 19:30:36.174234 kubelet[2002]: E0212 19:30:36.174194 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:36.175805 env[1141]: time="2024-02-12T19:30:36.175690750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:30:36.199429 kubelet[2002]: I0212 19:30:36.198875 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/50dd4007-e567-44a4-8534-c0500ed637cc-config-volume\") pod \"coredns-5d78c9869d-frmtd\" (UID: \"50dd4007-e567-44a4-8534-c0500ed637cc\") " pod="kube-system/coredns-5d78c9869d-frmtd" Feb 12 19:30:36.199429 kubelet[2002]: I0212 19:30:36.198930 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9z92q\" (UniqueName: \"kubernetes.io/projected/50dd4007-e567-44a4-8534-c0500ed637cc-kube-api-access-9z92q\") pod \"coredns-5d78c9869d-frmtd\" (UID: \"50dd4007-e567-44a4-8534-c0500ed637cc\") " pod="kube-system/coredns-5d78c9869d-frmtd" Feb 12 19:30:36.199429 kubelet[2002]: I0212 19:30:36.198956 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v6hhc\" (UniqueName: \"kubernetes.io/projected/44ac8a30-2ae8-4125-ace8-535d21d0b8d3-kube-api-access-v6hhc\") pod \"coredns-5d78c9869d-5k7dh\" (UID: \"44ac8a30-2ae8-4125-ace8-535d21d0b8d3\") " pod="kube-system/coredns-5d78c9869d-5k7dh" Feb 12 19:30:36.199429 kubelet[2002]: I0212 19:30:36.198993 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xfr8r\" (UniqueName: \"kubernetes.io/projected/c9935352-f103-4b61-876e-54da2abe1d04-kube-api-access-xfr8r\") pod \"calico-kube-controllers-75689bd899-lmj4f\" (UID: \"c9935352-f103-4b61-876e-54da2abe1d04\") " pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" Feb 12 19:30:36.199429 kubelet[2002]: I0212 19:30:36.199028 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c9935352-f103-4b61-876e-54da2abe1d04-tigera-ca-bundle\") pod \"calico-kube-controllers-75689bd899-lmj4f\" (UID: \"c9935352-f103-4b61-876e-54da2abe1d04\") " pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" Feb 12 19:30:36.199731 kubelet[2002]: I0212 19:30:36.199081 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/44ac8a30-2ae8-4125-ace8-535d21d0b8d3-config-volume\") pod \"coredns-5d78c9869d-5k7dh\" (UID: \"44ac8a30-2ae8-4125-ace8-535d21d0b8d3\") " pod="kube-system/coredns-5d78c9869d-5k7dh" Feb 12 19:30:36.335742 env[1141]: time="2024-02-12T19:30:36.335690293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75689bd899-lmj4f,Uid:c9935352-f103-4b61-876e-54da2abe1d04,Namespace:calico-system,Attempt:0,}" Feb 12 19:30:36.340023 kubelet[2002]: E0212 19:30:36.339998 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:36.341074 env[1141]: time="2024-02-12T19:30:36.340919759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5k7dh,Uid:44ac8a30-2ae8-4125-ace8-535d21d0b8d3,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:36.343526 kubelet[2002]: E0212 19:30:36.343505 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:36.344044 env[1141]: time="2024-02-12T19:30:36.344000332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-frmtd,Uid:50dd4007-e567-44a4-8534-c0500ed637cc,Namespace:kube-system,Attempt:0,}" Feb 12 19:30:36.485820 env[1141]: time="2024-02-12T19:30:36.485682724Z" level=error msg="Failed to destroy network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.486314 env[1141]: time="2024-02-12T19:30:36.486252469Z" level=error msg="Failed to destroy network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.486742 env[1141]: time="2024-02-12T19:30:36.486685608Z" level=error msg="encountered an error cleaning up failed sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.486799 env[1141]: time="2024-02-12T19:30:36.486759291Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75689bd899-lmj4f,Uid:c9935352-f103-4b61-876e-54da2abe1d04,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.486889 env[1141]: time="2024-02-12T19:30:36.486697608Z" level=error msg="encountered an error cleaning up failed sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.486927 env[1141]: time="2024-02-12T19:30:36.486872496Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-frmtd,Uid:50dd4007-e567-44a4-8534-c0500ed637cc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.487234 kubelet[2002]: E0212 19:30:36.487208 2002 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.487331 kubelet[2002]: E0212 19:30:36.487216 2002 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.487455 kubelet[2002]: E0212 19:30:36.487423 2002 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" Feb 12 19:30:36.487517 kubelet[2002]: E0212 19:30:36.487430 2002 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-frmtd" Feb 12 19:30:36.487679 kubelet[2002]: E0212 19:30:36.487669 2002 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" Feb 12 19:30:36.487723 kubelet[2002]: E0212 19:30:36.487677 2002 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-frmtd" Feb 12 19:30:36.487758 kubelet[2002]: E0212 19:30:36.487732 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-75689bd899-lmj4f_calico-system(c9935352-f103-4b61-876e-54da2abe1d04)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-75689bd899-lmj4f_calico-system(c9935352-f103-4b61-876e-54da2abe1d04)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" podUID=c9935352-f103-4b61-876e-54da2abe1d04 Feb 12 19:30:36.487758 kubelet[2002]: E0212 19:30:36.487734 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-frmtd_kube-system(50dd4007-e567-44a4-8534-c0500ed637cc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-frmtd_kube-system(50dd4007-e567-44a4-8534-c0500ed637cc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-frmtd" podUID=50dd4007-e567-44a4-8534-c0500ed637cc Feb 12 19:30:36.493723 env[1141]: time="2024-02-12T19:30:36.493672149Z" level=error msg="Failed to destroy network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.494076 env[1141]: time="2024-02-12T19:30:36.494035565Z" level=error msg="encountered an error cleaning up failed sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.494122 env[1141]: time="2024-02-12T19:30:36.494099648Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5k7dh,Uid:44ac8a30-2ae8-4125-ace8-535d21d0b8d3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.494383 kubelet[2002]: E0212 19:30:36.494325 2002 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:36.494445 kubelet[2002]: E0212 19:30:36.494385 2002 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5k7dh" Feb 12 19:30:36.494445 kubelet[2002]: E0212 19:30:36.494406 2002 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5k7dh" Feb 12 19:30:36.494445 kubelet[2002]: E0212 19:30:36.494449 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-5k7dh_kube-system(44ac8a30-2ae8-4125-ace8-535d21d0b8d3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-5k7dh_kube-system(44ac8a30-2ae8-4125-ace8-535d21d0b8d3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5k7dh" podUID=44ac8a30-2ae8-4125-ace8-535d21d0b8d3 Feb 12 19:30:37.094889 systemd[1]: Created slice kubepods-besteffort-podadc19104_1eb1_4629_b6c0_6317ec29da48.slice. Feb 12 19:30:37.096866 env[1141]: time="2024-02-12T19:30:37.096815137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25l5n,Uid:adc19104-1eb1-4629-b6c0-6317ec29da48,Namespace:calico-system,Attempt:0,}" Feb 12 19:30:37.187596 kubelet[2002]: I0212 19:30:37.187565 2002 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:30:37.189705 env[1141]: time="2024-02-12T19:30:37.188364459Z" level=info msg="StopPodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\"" Feb 12 19:30:37.189818 kubelet[2002]: I0212 19:30:37.189660 2002 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:30:37.190137 env[1141]: time="2024-02-12T19:30:37.190105092Z" level=info msg="StopPodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\"" Feb 12 19:30:37.190946 kubelet[2002]: I0212 19:30:37.190921 2002 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:30:37.191408 env[1141]: time="2024-02-12T19:30:37.191320062Z" level=info msg="StopPodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\"" Feb 12 19:30:37.198734 env[1141]: time="2024-02-12T19:30:37.198679408Z" level=error msg="Failed to destroy network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.199589 env[1141]: time="2024-02-12T19:30:37.199538603Z" level=error msg="encountered an error cleaning up failed sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.199671 env[1141]: time="2024-02-12T19:30:37.199601166Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25l5n,Uid:adc19104-1eb1-4629-b6c0-6317ec29da48,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.199817 kubelet[2002]: E0212 19:30:37.199778 2002 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.199910 kubelet[2002]: E0212 19:30:37.199845 2002 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:37.199950 kubelet[2002]: E0212 19:30:37.199918 2002 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-25l5n" Feb 12 19:30:37.199980 kubelet[2002]: E0212 19:30:37.199960 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-25l5n_calico-system(adc19104-1eb1-4629-b6c0-6317ec29da48)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-25l5n_calico-system(adc19104-1eb1-4629-b6c0-6317ec29da48)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:37.246760 env[1141]: time="2024-02-12T19:30:37.246689161Z" level=error msg="StopPodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" failed" error="failed to destroy network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.247038 kubelet[2002]: E0212 19:30:37.246990 2002 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:30:37.247135 kubelet[2002]: E0212 19:30:37.247053 2002 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71} Feb 12 19:30:37.247135 kubelet[2002]: E0212 19:30:37.247101 2002 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"44ac8a30-2ae8-4125-ace8-535d21d0b8d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:30:37.247135 kubelet[2002]: E0212 19:30:37.247129 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"44ac8a30-2ae8-4125-ace8-535d21d0b8d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5k7dh" podUID=44ac8a30-2ae8-4125-ace8-535d21d0b8d3 Feb 12 19:30:37.260751 env[1141]: time="2024-02-12T19:30:37.260685783Z" level=error msg="StopPodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" failed" error="failed to destroy network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.260957 kubelet[2002]: E0212 19:30:37.260931 2002 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:30:37.261070 kubelet[2002]: E0212 19:30:37.261001 2002 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b} Feb 12 19:30:37.261070 kubelet[2002]: E0212 19:30:37.261042 2002 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9935352-f103-4b61-876e-54da2abe1d04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:30:37.261070 kubelet[2002]: E0212 19:30:37.261069 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9935352-f103-4b61-876e-54da2abe1d04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" podUID=c9935352-f103-4b61-876e-54da2abe1d04 Feb 12 19:30:37.313832 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55-shm.mount: Deactivated successfully. Feb 12 19:30:37.313935 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b-shm.mount: Deactivated successfully. Feb 12 19:30:37.324504 env[1141]: time="2024-02-12T19:30:37.324427710Z" level=error msg="StopPodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" failed" error="failed to destroy network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:37.324701 kubelet[2002]: E0212 19:30:37.324674 2002 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:30:37.324757 kubelet[2002]: E0212 19:30:37.324713 2002 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55} Feb 12 19:30:37.324784 kubelet[2002]: E0212 19:30:37.324760 2002 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"50dd4007-e567-44a4-8534-c0500ed637cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:30:37.324844 kubelet[2002]: E0212 19:30:37.324793 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"50dd4007-e567-44a4-8534-c0500ed637cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-frmtd" podUID=50dd4007-e567-44a4-8534-c0500ed637cc Feb 12 19:30:38.193413 kubelet[2002]: I0212 19:30:38.193373 2002 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:30:38.195840 env[1141]: time="2024-02-12T19:30:38.195796282Z" level=info msg="StopPodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\"" Feb 12 19:30:38.254271 env[1141]: time="2024-02-12T19:30:38.254187858Z" level=error msg="StopPodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" failed" error="failed to destroy network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:30:38.254528 kubelet[2002]: E0212 19:30:38.254488 2002 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:30:38.254592 kubelet[2002]: E0212 19:30:38.254541 2002 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314} Feb 12 19:30:38.254592 kubelet[2002]: E0212 19:30:38.254583 2002 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adc19104-1eb1-4629-b6c0-6317ec29da48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:30:38.254672 kubelet[2002]: E0212 19:30:38.254609 2002 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adc19104-1eb1-4629-b6c0-6317ec29da48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-25l5n" podUID=adc19104-1eb1-4629-b6c0-6317ec29da48 Feb 12 19:30:38.966845 systemd[1]: Started sshd@7-10.0.0.116:22-10.0.0.1:51860.service. Feb 12 19:30:38.970436 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 12 19:30:38.970478 kernel: audit: type=1130 audit(1707766238.966:1106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.116:22-10.0.0.1:51860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:38.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.116:22-10.0.0.1:51860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:39.018000 audit[2990]: USER_ACCT pid=2990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.022349 sshd[2990]: Accepted publickey for core from 10.0.0.1 port 51860 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:39.022886 kernel: audit: type=1101 audit(1707766239.018:1107): pid=2990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.032430 kernel: audit: type=1103 audit(1707766239.024:1108): pid=2990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.032503 kernel: audit: type=1006 audit(1707766239.024:1109): pid=2990 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 12 19:30:39.032529 kernel: audit: type=1300 audit(1707766239.024:1109): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6830500 a2=3 a3=1 items=0 ppid=1 pid=2990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:39.032551 kernel: audit: type=1327 audit(1707766239.024:1109): proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:39.024000 audit[2990]: CRED_ACQ pid=2990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.024000 audit[2990]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6830500 a2=3 a3=1 items=0 ppid=1 pid=2990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:39.024000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:39.029802 systemd-logind[1125]: New session 8 of user core. Feb 12 19:30:39.025761 sshd[2990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:39.030306 systemd[1]: Started session-8.scope. Feb 12 19:30:39.039590 kernel: audit: type=1105 audit(1707766239.033:1110): pid=2990 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.039653 kernel: audit: type=1103 audit(1707766239.034:1111): pid=2992 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.033000 audit[2990]: USER_START pid=2990 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.034000 audit[2992]: CRED_ACQ pid=2992 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.178347 sshd[2990]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:39.184033 kernel: audit: type=1106 audit(1707766239.178:1112): pid=2990 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.184129 kernel: audit: type=1104 audit(1707766239.178:1113): pid=2990 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.178000 audit[2990]: USER_END pid=2990 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.178000 audit[2990]: CRED_DISP pid=2990 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:39.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.116:22-10.0.0.1:51860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:39.181723 systemd-logind[1125]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:30:39.181895 systemd[1]: sshd@7-10.0.0.116:22-10.0.0.1:51860.service: Deactivated successfully. Feb 12 19:30:39.182653 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:30:39.183771 systemd-logind[1125]: Removed session 8. Feb 12 19:30:40.648386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount277788301.mount: Deactivated successfully. Feb 12 19:30:40.995178 env[1141]: time="2024-02-12T19:30:40.995058700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:40.998818 env[1141]: time="2024-02-12T19:30:40.998782839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.000261 env[1141]: time="2024-02-12T19:30:41.000220292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.001738 env[1141]: time="2024-02-12T19:30:41.001710267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:41.002792 env[1141]: time="2024-02-12T19:30:41.002758185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:30:41.017844 env[1141]: time="2024-02-12T19:30:41.017771645Z" level=info msg="CreateContainer within sandbox \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:30:41.030349 env[1141]: time="2024-02-12T19:30:41.030306217Z" level=info msg="CreateContainer within sandbox \"43e001199a95b010c4557cb833799a35eaa3da995ee3011d9837e013af21d562\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"14221304b76365851f7c068bca375f9cab0426625c6838351aaf0febdab15dc3\"" Feb 12 19:30:41.031003 env[1141]: time="2024-02-12T19:30:41.030911439Z" level=info msg="StartContainer for \"14221304b76365851f7c068bca375f9cab0426625c6838351aaf0febdab15dc3\"" Feb 12 19:30:41.048005 systemd[1]: Started cri-containerd-14221304b76365851f7c068bca375f9cab0426625c6838351aaf0febdab15dc3.scope. Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2452 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323231333034623736333635383531663763303638626361333735 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit: BPF prog-id=145 op=LOAD Feb 12 19:30:41.102000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2452 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323231333034623736333635383531663763303638626361333735 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit: BPF prog-id=146 op=LOAD Feb 12 19:30:41.102000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2452 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323231333034623736333635383531663763303638626361333735 Feb 12 19:30:41.102000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:30:41.102000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:41.102000 audit: BPF prog-id=147 op=LOAD Feb 12 19:30:41.102000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2452 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:41.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134323231333034623736333635383531663763303638626361333735 Feb 12 19:30:41.115083 env[1141]: time="2024-02-12T19:30:41.115041509Z" level=info msg="StartContainer for \"14221304b76365851f7c068bca375f9cab0426625c6838351aaf0febdab15dc3\" returns successfully" Feb 12 19:30:41.201843 kubelet[2002]: E0212 19:30:41.201812 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:41.217237 kubelet[2002]: I0212 19:30:41.216551 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-t9zvz" podStartSLOduration=0.942188076 podCreationTimestamp="2024-02-12 19:30:25 +0000 UTC" firstStartedPulling="2024-02-12 19:30:25.729150723 +0000 UTC m=+19.746207265" lastFinishedPulling="2024-02-12 19:30:41.00347801 +0000 UTC m=+35.020534552" observedRunningTime="2024-02-12 19:30:41.216188712 +0000 UTC m=+35.233245254" watchObservedRunningTime="2024-02-12 19:30:41.216515363 +0000 UTC m=+35.233571905" Feb 12 19:30:41.288728 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:30:41.288918 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:30:42.203232 kubelet[2002]: I0212 19:30:42.203188 2002 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:30:42.204046 kubelet[2002]: E0212 19:30:42.204008 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:42.628000 audit[3118]: AVC avc: denied { write } for pid=3118 comm="tee" name="fd" dev="proc" ino=18952 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.628000 audit[3118]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1ffe991 a2=241 a3=1b6 items=1 ppid=3081 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.628000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:30:42.628000 audit: PATH item=0 name="/dev/fd/63" inode=19494 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.651000 audit[3137]: AVC avc: denied { write } for pid=3137 comm="tee" name="fd" dev="proc" ino=18963 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.651000 audit[3137]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4ca997f a2=241 a3=1b6 items=1 ppid=3092 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.651000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:30:42.651000 audit: PATH item=0 name="/dev/fd/63" inode=18129 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.651000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.661000 audit[3149]: AVC avc: denied { write } for pid=3149 comm="tee" name="fd" dev="proc" ino=19513 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.661000 audit[3149]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff31be98f a2=241 a3=1b6 items=1 ppid=3089 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.661000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:30:42.661000 audit: PATH item=0 name="/dev/fd/63" inode=18133 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.661000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.663000 audit[3139]: AVC avc: denied { write } for pid=3139 comm="tee" name="fd" dev="proc" ino=18967 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.663000 audit[3139]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff26a98f a2=241 a3=1b6 items=1 ppid=3085 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.663000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:30:42.663000 audit: PATH item=0 name="/dev/fd/63" inode=18130 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.664000 audit[3142]: AVC avc: denied { write } for pid=3142 comm="tee" name="fd" dev="proc" ino=19518 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.664000 audit[3142]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec2bd980 a2=241 a3=1b6 items=1 ppid=3078 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.664000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:30:42.664000 audit: PATH item=0 name="/dev/fd/63" inode=18960 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.664000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.685000 audit[3133]: AVC avc: denied { write } for pid=3133 comm="tee" name="fd" dev="proc" ino=18971 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.685000 audit[3133]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffd5b998f a2=241 a3=1b6 items=1 ppid=3079 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.685000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:30:42.685000 audit: PATH item=0 name="/dev/fd/63" inode=19504 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.685000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.713000 audit[3154]: AVC avc: denied { write } for pid=3154 comm="tee" name="fd" dev="proc" ino=19529 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:30:42.713000 audit[3154]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcecc2990 a2=241 a3=1b6 items=1 ppid=3095 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.713000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:30:42.713000 audit: PATH item=0 name="/dev/fd/63" inode=19514 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:30:42.713000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.948000 audit: BPF prog-id=148 op=LOAD Feb 12 19:30:42.948000 audit[3233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff4a57b78 a2=70 a3=0 items=0 ppid=3082 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:42.949000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit: BPF prog-id=149 op=LOAD Feb 12 19:30:42.949000 audit[3233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff4a57b78 a2=70 a3=4a174c items=0 ppid=3082 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:42.949000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:30:42.949000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.949000 audit[3233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff4a57ba8 a2=70 a3=663079f items=0 ppid=3082 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.950000 audit: BPF prog-id=150 op=LOAD Feb 12 19:30:42.950000 audit[3233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff4a57af8 a2=70 a3=66307b9 items=0 ppid=3082 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:30:42.953000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.953000 audit[3235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff54852a8 a2=70 a3=0 items=0 ppid=3082 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:30:42.953000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:42.953000 audit[3235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff5485188 a2=70 a3=2 items=0 ppid=3082 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:42.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:30:42.965000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:30:43.001000 audit[3266]: NETFILTER_CFG table=mangle:99 family=2 entries=19 op=nft_register_chain pid=3266 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:43.001000 audit[3266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd8991dd0 a2=0 a3=ffffb454dfa8 items=0 ppid=3082 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:43.001000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:43.001000 audit[3261]: NETFILTER_CFG table=raw:100 family=2 entries=19 op=nft_register_chain pid=3261 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:43.001000 audit[3261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffdeff7590 a2=0 a3=ffff86e5cfa8 items=0 ppid=3082 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:43.001000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:43.003000 audit[3268]: NETFILTER_CFG table=nat:101 family=2 entries=16 op=nft_register_chain pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:43.003000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffdb670750 a2=0 a3=ffff999d3fa8 items=0 ppid=3082 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:43.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:43.005000 audit[3262]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:43.005000 audit[3262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffc19e3080 a2=0 a3=ffffa0f4afa8 items=0 ppid=3082 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:43.005000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:43.823540 systemd-networkd[1040]: vxlan.calico: Link UP Feb 12 19:30:43.823551 systemd-networkd[1040]: vxlan.calico: Gained carrier Feb 12 19:30:44.183146 systemd[1]: Started sshd@8-10.0.0.116:22-10.0.0.1:38212.service. Feb 12 19:30:44.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.116:22-10.0.0.1:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:44.184151 kernel: kauditd_printk_skb: 140 callbacks suppressed Feb 12 19:30:44.184215 kernel: audit: type=1130 audit(1707766244.182:1141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.116:22-10.0.0.1:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:44.233000 audit[3277]: USER_ACCT pid=3277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.234389 sshd[3277]: Accepted publickey for core from 10.0.0.1 port 38212 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:44.235955 sshd[3277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:44.234000 audit[3277]: CRED_ACQ pid=3277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.239099 kernel: audit: type=1101 audit(1707766244.233:1142): pid=3277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.239188 kernel: audit: type=1103 audit(1707766244.234:1143): pid=3277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.239207 kernel: audit: type=1006 audit(1707766244.234:1144): pid=3277 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 19:30:44.234000 audit[3277]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcca1ad40 a2=3 a3=1 items=0 ppid=1 pid=3277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.243283 kernel: audit: type=1300 audit(1707766244.234:1144): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcca1ad40 a2=3 a3=1 items=0 ppid=1 pid=3277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:44.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:44.244306 kernel: audit: type=1327 audit(1707766244.234:1144): proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:44.245404 systemd-logind[1125]: New session 9 of user core. Feb 12 19:30:44.245930 systemd[1]: Started session-9.scope. Feb 12 19:30:44.249000 audit[3277]: USER_START pid=3277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.251000 audit[3279]: CRED_ACQ pid=3279 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.256933 kernel: audit: type=1105 audit(1707766244.249:1145): pid=3277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.256994 kernel: audit: type=1103 audit(1707766244.251:1146): pid=3279 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.382409 sshd[3277]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:44.384000 audit[3277]: USER_END pid=3277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.386744 systemd[1]: sshd@8-10.0.0.116:22-10.0.0.1:38212.service: Deactivated successfully. Feb 12 19:30:44.387607 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:30:44.384000 audit[3277]: CRED_DISP pid=3277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.388365 systemd-logind[1125]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:30:44.389099 systemd-logind[1125]: Removed session 9. Feb 12 19:30:44.389943 kernel: audit: type=1106 audit(1707766244.384:1147): pid=3277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.390000 kernel: audit: type=1104 audit(1707766244.384:1148): pid=3277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:44.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.116:22-10.0.0.1:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:45.766028 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL Feb 12 19:30:49.089012 env[1141]: time="2024-02-12T19:30:49.087807725Z" level=info msg="StopPodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\"" Feb 12 19:30:49.089012 env[1141]: time="2024-02-12T19:30:49.088622028Z" level=info msg="StopPodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\"" Feb 12 19:30:49.092799 env[1141]: time="2024-02-12T19:30:49.092763826Z" level=info msg="StopPodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\"" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.202 [INFO][3360] k8s.go 578: Cleaning up netns ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.203 [INFO][3360] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" iface="eth0" netns="/var/run/netns/cni-3d9ffe21-eeb2-91f5-4621-8fc3833b1ac5" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.203 [INFO][3360] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" iface="eth0" netns="/var/run/netns/cni-3d9ffe21-eeb2-91f5-4621-8fc3833b1ac5" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.203 [INFO][3360] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" iface="eth0" netns="/var/run/netns/cni-3d9ffe21-eeb2-91f5-4621-8fc3833b1ac5" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.203 [INFO][3360] k8s.go 585: Releasing IP address(es) ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.203 [INFO][3360] utils.go 188: Calico CNI releasing IP address ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.341 [INFO][3374] ipam_plugin.go 415: Releasing address using handleID ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.341 [INFO][3374] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.341 [INFO][3374] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.354 [WARNING][3374] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.354 [INFO][3374] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.357 [INFO][3374] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:49.360578 env[1141]: 2024-02-12 19:30:49.358 [INFO][3360] k8s.go 591: Teardown processing complete. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:30:49.360578 env[1141]: time="2024-02-12T19:30:49.360418806Z" level=info msg="TearDown network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" successfully" Feb 12 19:30:49.360578 env[1141]: time="2024-02-12T19:30:49.360452207Z" level=info msg="StopPodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" returns successfully" Feb 12 19:30:49.363617 systemd[1]: run-netns-cni\x2d3d9ffe21\x2deeb2\x2d91f5\x2d4621\x2d8fc3833b1ac5.mount: Deactivated successfully. Feb 12 19:30:49.364777 kubelet[2002]: E0212 19:30:49.364411 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:49.365436 env[1141]: time="2024-02-12T19:30:49.365392667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-frmtd,Uid:50dd4007-e567-44a4-8534-c0500ed637cc,Namespace:kube-system,Attempt:1,}" Feb 12 19:30:49.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.116:22-10.0.0.1:38216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:49.388839 systemd[1]: Started sshd@9-10.0.0.116:22-10.0.0.1:38216.service. Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.204 [INFO][3343] k8s.go 578: Cleaning up netns ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.204 [INFO][3343] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" iface="eth0" netns="/var/run/netns/cni-15ee3a85-cd89-7c66-3337-6304235a523c" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.205 [INFO][3343] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" iface="eth0" netns="/var/run/netns/cni-15ee3a85-cd89-7c66-3337-6304235a523c" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.205 [INFO][3343] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" iface="eth0" netns="/var/run/netns/cni-15ee3a85-cd89-7c66-3337-6304235a523c" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.205 [INFO][3343] k8s.go 585: Releasing IP address(es) ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.205 [INFO][3343] utils.go 188: Calico CNI releasing IP address ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.341 [INFO][3375] ipam_plugin.go 415: Releasing address using handleID ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.341 [INFO][3375] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.357 [INFO][3375] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.373 [WARNING][3375] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.374 [INFO][3375] ipam_plugin.go 443: Releasing address using workloadID ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.376 [INFO][3375] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:49.389746 env[1141]: 2024-02-12 19:30:49.385 [INFO][3343] k8s.go 591: Teardown processing complete. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:30:49.392185 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:30:49.392390 kernel: audit: type=1130 audit(1707766249.387:1150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.116:22-10.0.0.1:38216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:49.394663 systemd[1]: run-netns-cni\x2d15ee3a85\x2dcd89\x2d7c66\x2d3337\x2d6304235a523c.mount: Deactivated successfully. Feb 12 19:30:49.395989 env[1141]: time="2024-02-12T19:30:49.395947337Z" level=info msg="TearDown network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" successfully" Feb 12 19:30:49.396156 env[1141]: time="2024-02-12T19:30:49.396134023Z" level=info msg="StopPodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" returns successfully" Feb 12 19:30:49.398452 env[1141]: time="2024-02-12T19:30:49.398414128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75689bd899-lmj4f,Uid:c9935352-f103-4b61-876e-54da2abe1d04,Namespace:calico-system,Attempt:1,}" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.200 [INFO][3345] k8s.go 578: Cleaning up netns ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.201 [INFO][3345] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" iface="eth0" netns="/var/run/netns/cni-4232c4aa-109b-c72f-61b3-f75c3b3b050b" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.202 [INFO][3345] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" iface="eth0" netns="/var/run/netns/cni-4232c4aa-109b-c72f-61b3-f75c3b3b050b" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.203 [INFO][3345] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" iface="eth0" netns="/var/run/netns/cni-4232c4aa-109b-c72f-61b3-f75c3b3b050b" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.203 [INFO][3345] k8s.go 585: Releasing IP address(es) ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.203 [INFO][3345] utils.go 188: Calico CNI releasing IP address ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.341 [INFO][3373] ipam_plugin.go 415: Releasing address using handleID ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.341 [INFO][3373] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.376 [INFO][3373] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.390 [WARNING][3373] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.394 [INFO][3373] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.396 [INFO][3373] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:49.415646 env[1141]: 2024-02-12 19:30:49.411 [INFO][3345] k8s.go 591: Teardown processing complete. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:30:49.416151 env[1141]: time="2024-02-12T19:30:49.415837664Z" level=info msg="TearDown network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" successfully" Feb 12 19:30:49.416151 env[1141]: time="2024-02-12T19:30:49.415926066Z" level=info msg="StopPodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" returns successfully" Feb 12 19:30:49.416599 kubelet[2002]: E0212 19:30:49.416573 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:49.417055 env[1141]: time="2024-02-12T19:30:49.416978856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5k7dh,Uid:44ac8a30-2ae8-4125-ace8-535d21d0b8d3,Namespace:kube-system,Attempt:1,}" Feb 12 19:30:49.451000 audit[3396]: USER_ACCT pid=3396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.455640 sshd[3396]: Accepted publickey for core from 10.0.0.1 port 38216 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:49.455938 kernel: audit: type=1101 audit(1707766249.451:1151): pid=3396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.454000 audit[3396]: CRED_ACQ pid=3396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.462252 kernel: audit: type=1103 audit(1707766249.454:1152): pid=3396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.462327 kernel: audit: type=1006 audit(1707766249.457:1153): pid=3396 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:30:49.457000 audit[3396]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff98500e0 a2=3 a3=1 items=0 ppid=1 pid=3396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.465123 sshd[3396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:49.465788 kernel: audit: type=1300 audit(1707766249.457:1153): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff98500e0 a2=3 a3=1 items=0 ppid=1 pid=3396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.457000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:49.467975 kernel: audit: type=1327 audit(1707766249.457:1153): proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:49.477655 systemd-logind[1125]: New session 10 of user core. Feb 12 19:30:49.477776 systemd[1]: Started session-10.scope. Feb 12 19:30:49.482000 audit[3396]: USER_START pid=3396 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.487883 kernel: audit: type=1105 audit(1707766249.482:1154): pid=3396 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.486000 audit[3443]: CRED_ACQ pid=3443 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.490905 kernel: audit: type=1103 audit(1707766249.486:1155): pid=3443 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.572241 systemd-networkd[1040]: cali90edda09400: Link UP Feb 12 19:30:49.574481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:30:49.574558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali90edda09400: link becomes ready Feb 12 19:30:49.574652 systemd-networkd[1040]: cali90edda09400: Gained carrier Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.458 [INFO][3399] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--frmtd-eth0 coredns-5d78c9869d- kube-system 50dd4007-e567-44a4-8534-c0500ed637cc 809 0 2024-02-12 19:30:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-frmtd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali90edda09400 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.459 [INFO][3399] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.516 [INFO][3445] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" HandleID="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.537 [INFO][3445] ipam_plugin.go 268: Auto assigning IP ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" HandleID="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029cd90), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-frmtd", "timestamp":"2024-02-12 19:30:49.516034796 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.537 [INFO][3445] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.537 [INFO][3445] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.537 [INFO][3445] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.541 [INFO][3445] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.546 [INFO][3445] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.550 [INFO][3445] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.552 [INFO][3445] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.554 [INFO][3445] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.554 [INFO][3445] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.556 [INFO][3445] ipam.go 1682: Creating new handle: k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.559 [INFO][3445] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.564 [INFO][3445] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.564 [INFO][3445] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" host="localhost" Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.564 [INFO][3445] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:49.595839 env[1141]: 2024-02-12 19:30:49.564 [INFO][3445] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" HandleID="k8s-pod-network.dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.596448 env[1141]: 2024-02-12 19:30:49.569 [INFO][3399] k8s.go 385: Populated endpoint ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--frmtd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"50dd4007-e567-44a4-8534-c0500ed637cc", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-frmtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90edda09400", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:49.596448 env[1141]: 2024-02-12 19:30:49.569 [INFO][3399] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.596448 env[1141]: 2024-02-12 19:30:49.569 [INFO][3399] dataplane_linux.go 68: Setting the host side veth name to cali90edda09400 ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.596448 env[1141]: 2024-02-12 19:30:49.581 [INFO][3399] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.596448 env[1141]: 2024-02-12 19:30:49.581 [INFO][3399] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--frmtd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"50dd4007-e567-44a4-8534-c0500ed637cc", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da", Pod:"coredns-5d78c9869d-frmtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90edda09400", MAC:"22:7d:6d:d7:f9:9d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:49.596448 env[1141]: 2024-02-12 19:30:49.594 [INFO][3399] k8s.go 491: Wrote updated endpoint to datastore ContainerID="dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da" Namespace="kube-system" Pod="coredns-5d78c9869d-frmtd" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:30:49.613555 env[1141]: time="2024-02-12T19:30:49.613261124Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:49.614160 env[1141]: time="2024-02-12T19:30:49.613805339Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:49.614330 env[1141]: time="2024-02-12T19:30:49.614304114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:49.614581 env[1141]: time="2024-02-12T19:30:49.614552201Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da pid=3499 runtime=io.containerd.runc.v2 Feb 12 19:30:49.644719 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60beeb05184: link becomes ready Feb 12 19:30:49.643457 systemd-networkd[1040]: cali60beeb05184: Link UP Feb 12 19:30:49.643610 systemd-networkd[1040]: cali60beeb05184: Gained carrier Feb 12 19:30:49.646972 systemd[1]: Started cri-containerd-dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da.scope. Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.477 [INFO][3425] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--5k7dh-eth0 coredns-5d78c9869d- kube-system 44ac8a30-2ae8-4125-ace8-535d21d0b8d3 807 0 2024-02-12 19:30:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-5k7dh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali60beeb05184 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.477 [INFO][3425] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.515 [INFO][3452] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" HandleID="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.536 [INFO][3452] ipam_plugin.go 268: Auto assigning IP ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" HandleID="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000132f70), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-5k7dh", "timestamp":"2024-02-12 19:30:49.51512713 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.536 [INFO][3452] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.564 [INFO][3452] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.564 [INFO][3452] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.566 [INFO][3452] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.577 [INFO][3452] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.585 [INFO][3452] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.586 [INFO][3452] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.591 [INFO][3452] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.592 [INFO][3452] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.598 [INFO][3452] ipam.go 1682: Creating new handle: k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.605 [INFO][3452] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.616 [INFO][3452] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.616 [INFO][3452] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" host="localhost" Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.616 [INFO][3452] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:49.675045 env[1141]: 2024-02-12 19:30:49.616 [INFO][3452] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" HandleID="k8s-pod-network.eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.675692 env[1141]: 2024-02-12 19:30:49.637 [INFO][3425] k8s.go 385: Populated endpoint ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--5k7dh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ac8a30-2ae8-4125-ace8-535d21d0b8d3", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-5k7dh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali60beeb05184", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:49.675692 env[1141]: 2024-02-12 19:30:49.637 [INFO][3425] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.675692 env[1141]: 2024-02-12 19:30:49.637 [INFO][3425] dataplane_linux.go 68: Setting the host side veth name to cali60beeb05184 ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.675692 env[1141]: 2024-02-12 19:30:49.641 [INFO][3425] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.675692 env[1141]: 2024-02-12 19:30:49.642 [INFO][3425] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--5k7dh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ac8a30-2ae8-4125-ace8-535d21d0b8d3", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc", Pod:"coredns-5d78c9869d-5k7dh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali60beeb05184", MAC:"72:e2:20:4b:97:0d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:49.675692 env[1141]: 2024-02-12 19:30:49.670 [INFO][3425] k8s.go 491: Wrote updated endpoint to datastore ContainerID="eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc" Namespace="kube-system" Pod="coredns-5d78c9869d-5k7dh" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:30:49.682294 sshd[3396]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:49.686401 systemd[1]: Started sshd@10-10.0.0.116:22-10.0.0.1:38226.service. Feb 12 19:30:49.682000 audit[3396]: USER_END pid=3396 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.682000 audit[3396]: CRED_DISP pid=3396 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.691791 kernel: audit: type=1106 audit(1707766249.682:1156): pid=3396 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.691900 kernel: audit: type=1104 audit(1707766249.682:1157): pid=3396 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.693012 systemd[1]: sshd@9-10.0.0.116:22-10.0.0.1:38216.service: Deactivated successfully. Feb 12 19:30:49.693924 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:30:49.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.116:22-10.0.0.1:38226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:49.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.116:22-10.0.0.1:38216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:49.694675 systemd-logind[1125]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:30:49.698455 systemd-logind[1125]: Removed session 10. Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.706000 audit: BPF prog-id=151 op=LOAD Feb 12 19:30:49.708000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.708000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3499 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376566376135666631666231623930376461323436333338626630 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3499 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376566376135666631666231623930376461323436333338626630 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.709000 audit: BPF prog-id=152 op=LOAD Feb 12 19:30:49.709000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3499 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376566376135666631666231623930376461323436333338626630 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.710000 audit: BPF prog-id=153 op=LOAD Feb 12 19:30:49.710000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3499 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376566376135666631666231623930376461323436333338626630 Feb 12 19:30:49.710000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:30:49.711000 audit: BPF prog-id=152 op=UNLOAD Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.711000 audit: BPF prog-id=154 op=LOAD Feb 12 19:30:49.711000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3499 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376566376135666631666231623930376461323436333338626630 Feb 12 19:30:49.714977 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:30:49.719598 env[1141]: time="2024-02-12T19:30:49.719526349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:49.719754 env[1141]: time="2024-02-12T19:30:49.719725795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:49.719919 env[1141]: time="2024-02-12T19:30:49.719849838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:49.720262 env[1141]: time="2024-02-12T19:30:49.720222449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc pid=3553 runtime=io.containerd.runc.v2 Feb 12 19:30:49.725000 audit[3550]: NETFILTER_CFG table=filter:103 family=2 entries=36 op=nft_register_chain pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:49.725000 audit[3550]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffeb099e90 a2=0 a3=ffffa73a0fa8 items=0 ppid=3082 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.725000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:49.733657 systemd-networkd[1040]: calid8cd01479d6: Link UP Feb 12 19:30:49.734940 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8cd01479d6: link becomes ready Feb 12 19:30:49.734545 systemd-networkd[1040]: calid8cd01479d6: Gained carrier Feb 12 19:30:49.734000 audit[3540]: USER_ACCT pid=3540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.737942 sshd[3540]: Accepted publickey for core from 10.0.0.1 port 38226 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:49.739000 audit[3540]: CRED_ACQ pid=3540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.739000 audit[3540]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd153260 a2=3 a3=1 items=0 ppid=1 pid=3540 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.739000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:49.741382 sshd[3540]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:49.748837 systemd-logind[1125]: New session 11 of user core. Feb 12 19:30:49.749397 systemd[1]: Started session-11.scope. Feb 12 19:30:49.753248 env[1141]: time="2024-02-12T19:30:49.753194068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-frmtd,Uid:50dd4007-e567-44a4-8534-c0500ed637cc,Namespace:kube-system,Attempt:1,} returns sandbox id \"dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da\"" Feb 12 19:30:49.754059 kubelet[2002]: E0212 19:30:49.754032 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:49.754000 audit[3540]: USER_START pid=3540 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.483 [INFO][3410] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0 calico-kube-controllers-75689bd899- calico-system c9935352-f103-4b61-876e-54da2abe1d04 808 0 2024-02-12 19:30:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:75689bd899 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-75689bd899-lmj4f eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid8cd01479d6 [] []}} ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.483 [INFO][3410] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.517 [INFO][3451] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" HandleID="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.538 [INFO][3451] ipam_plugin.go 268: Auto assigning IP ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" HandleID="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029d7b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-75689bd899-lmj4f", "timestamp":"2024-02-12 19:30:49.517961611 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.538 [INFO][3451] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.619 [INFO][3451] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.620 [INFO][3451] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.629 [INFO][3451] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.644 [INFO][3451] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.664 [INFO][3451] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.674 [INFO][3451] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.686 [INFO][3451] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.686 [INFO][3451] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.713 [INFO][3451] ipam.go 1682: Creating new handle: k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.721 [INFO][3451] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.726 [INFO][3451] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.726 [INFO][3451] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" host="localhost" Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.726 [INFO][3451] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:49.757838 env[1141]: 2024-02-12 19:30:49.726 [INFO][3451] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" HandleID="k8s-pod-network.3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.758438 env[1141]: 2024-02-12 19:30:49.729 [INFO][3410] k8s.go 385: Populated endpoint ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0", GenerateName:"calico-kube-controllers-75689bd899-", Namespace:"calico-system", SelfLink:"", UID:"c9935352-f103-4b61-876e-54da2abe1d04", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75689bd899", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-75689bd899-lmj4f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8cd01479d6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:49.758438 env[1141]: 2024-02-12 19:30:49.729 [INFO][3410] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.758438 env[1141]: 2024-02-12 19:30:49.729 [INFO][3410] dataplane_linux.go 68: Setting the host side veth name to calid8cd01479d6 ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.758438 env[1141]: 2024-02-12 19:30:49.734 [INFO][3410] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.758438 env[1141]: 2024-02-12 19:30:49.736 [INFO][3410] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0", GenerateName:"calico-kube-controllers-75689bd899-", Namespace:"calico-system", SelfLink:"", UID:"c9935352-f103-4b61-876e-54da2abe1d04", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75689bd899", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da", Pod:"calico-kube-controllers-75689bd899-lmj4f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8cd01479d6", MAC:"52:68:4c:d3:95:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:49.758438 env[1141]: 2024-02-12 19:30:49.752 [INFO][3410] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da" Namespace="calico-system" Pod="calico-kube-controllers-75689bd899-lmj4f" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:30:49.757000 audit[3581]: CRED_ACQ pid=3581 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:49.760851 env[1141]: time="2024-02-12T19:30:49.760783124Z" level=info msg="CreateContainer within sandbox \"dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:30:49.761000 audit[3588]: NETFILTER_CFG table=filter:104 family=2 entries=30 op=nft_register_chain pid=3588 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:49.761000 audit[3588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=fffff211d6b0 a2=0 a3=ffff93541fa8 items=0 ppid=3082 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.761000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:49.774014 systemd[1]: Started cri-containerd-eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc.scope. Feb 12 19:30:49.779749 env[1141]: time="2024-02-12T19:30:49.779700982Z" level=info msg="CreateContainer within sandbox \"dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"53e19ced9bc7d081023a4668a0a290ad7ace659f4c10f77536281e03ad6b3433\"" Feb 12 19:30:49.780738 env[1141]: time="2024-02-12T19:30:49.780344681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:49.780738 env[1141]: time="2024-02-12T19:30:49.780387722Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:49.780738 env[1141]: time="2024-02-12T19:30:49.780397922Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:49.781063 env[1141]: time="2024-02-12T19:30:49.781018820Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da pid=3608 runtime=io.containerd.runc.v2 Feb 12 19:30:49.782960 env[1141]: time="2024-02-12T19:30:49.782820711Z" level=info msg="StartContainer for \"53e19ced9bc7d081023a4668a0a290ad7ace659f4c10f77536281e03ad6b3433\"" Feb 12 19:30:49.787000 audit[3620]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=3620 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:49.787000 audit[3620]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=fffff60aa280 a2=0 a3=ffffb49d0fa8 items=0 ppid=3082 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.797000 audit: BPF prog-id=155 op=LOAD Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3553 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633163393764353462396330623831393730666136346262313234 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3553 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633163393764353462396330623831393730666136346262313234 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.799000 audit: BPF prog-id=156 op=LOAD Feb 12 19:30:49.799000 audit[3565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3553 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633163393764353462396330623831393730666136346262313234 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.802930 systemd[1]: Started cri-containerd-3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da.scope. Feb 12 19:30:49.800000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.800000 audit: BPF prog-id=157 op=LOAD Feb 12 19:30:49.800000 audit[3565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3553 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633163393764353462396330623831393730666136346262313234 Feb 12 19:30:49.801000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:30:49.801000 audit: BPF prog-id=156 op=UNLOAD Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { perfmon } for pid=3565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit[3565]: AVC avc: denied { bpf } for pid=3565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.801000 audit: BPF prog-id=158 op=LOAD Feb 12 19:30:49.801000 audit[3565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3553 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633163393764353462396330623831393730666136346262313234 Feb 12 19:30:49.808140 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:30:49.809673 systemd[1]: Started cri-containerd-53e19ced9bc7d081023a4668a0a290ad7ace659f4c10f77536281e03ad6b3433.scope. Feb 12 19:30:49.847944 env[1141]: time="2024-02-12T19:30:49.847899884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5k7dh,Uid:44ac8a30-2ae8-4125-ace8-535d21d0b8d3,Namespace:kube-system,Attempt:1,} returns sandbox id \"eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc\"" Feb 12 19:30:49.848596 kubelet[2002]: E0212 19:30:49.848566 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:49.850959 env[1141]: time="2024-02-12T19:30:49.850908569Z" level=info msg="CreateContainer within sandbox \"eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.851000 audit: BPF prog-id=159 op=LOAD Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.853000 audit: BPF prog-id=160 op=LOAD Feb 12 19:30:49.853000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.853000 audit[3627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3608 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364356136333866656438333734646235333833333836663236383431 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3608 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364356136333866656438333734646235333833333836663236383431 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit: BPF prog-id=161 op=LOAD Feb 12 19:30:49.854000 audit[3627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3608 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364356136333866656438333734646235333833333836663236383431 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit: BPF prog-id=162 op=LOAD Feb 12 19:30:49.854000 audit[3627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3608 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364356136333866656438333734646235333833333836663236383431 Feb 12 19:30:49.854000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:30:49.854000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { perfmon } for pid=3627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit[3627]: AVC avc: denied { bpf } for pid=3627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.854000 audit: BPF prog-id=163 op=LOAD Feb 12 19:30:49.854000 audit[3627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3608 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364356136333866656438333734646235333833333836663236383431 Feb 12 19:30:49.857516 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:30:49.856000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.856000 audit[3639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3499 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533653139636564396263376430383130323361343636386130613239 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3499 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533653139636564396263376430383130323361343636386130613239 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit: BPF prog-id=164 op=LOAD Feb 12 19:30:49.858000 audit[3639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3499 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533653139636564396263376430383130323361343636386130613239 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit: BPF prog-id=165 op=LOAD Feb 12 19:30:49.858000 audit[3639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3499 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533653139636564396263376430383130323361343636386130613239 Feb 12 19:30:49.858000 audit: BPF prog-id=165 op=UNLOAD Feb 12 19:30:49.858000 audit: BPF prog-id=164 op=UNLOAD Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.858000 audit: BPF prog-id=166 op=LOAD Feb 12 19:30:49.858000 audit[3639]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3499 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533653139636564396263376430383130323361343636386130613239 Feb 12 19:30:49.879448 env[1141]: time="2024-02-12T19:30:49.872562586Z" level=info msg="CreateContainer within sandbox \"eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f55a7f1021f7ece4af50d7ced8071e697e5ab4136aafe07de1988895e004cdf4\"" Feb 12 19:30:49.882396 env[1141]: time="2024-02-12T19:30:49.881530481Z" level=info msg="StartContainer for \"f55a7f1021f7ece4af50d7ced8071e697e5ab4136aafe07de1988895e004cdf4\"" Feb 12 19:30:49.882678 env[1141]: time="2024-02-12T19:30:49.882640273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75689bd899-lmj4f,Uid:c9935352-f103-4b61-876e-54da2abe1d04,Namespace:calico-system,Attempt:1,} returns sandbox id \"3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da\"" Feb 12 19:30:49.886680 env[1141]: time="2024-02-12T19:30:49.886649707Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:30:49.894654 env[1141]: time="2024-02-12T19:30:49.894601933Z" level=info msg="StartContainer for \"53e19ced9bc7d081023a4668a0a290ad7ace659f4c10f77536281e03ad6b3433\" returns successfully" Feb 12 19:30:49.908303 systemd[1]: Started cri-containerd-f55a7f1021f7ece4af50d7ced8071e697e5ab4136aafe07de1988895e004cdf4.scope. Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.925000 audit: BPF prog-id=167 op=LOAD Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3553 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356137663130323166376563653461663530643763656438303731 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3553 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356137663130323166376563653461663530643763656438303731 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.926000 audit: BPF prog-id=168 op=LOAD Feb 12 19:30:49.926000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3553 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356137663130323166376563653461663530643763656438303731 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.927000 audit: BPF prog-id=169 op=LOAD Feb 12 19:30:49.927000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3553 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356137663130323166376563653461663530643763656438303731 Feb 12 19:30:49.927000 audit: BPF prog-id=169 op=UNLOAD Feb 12 19:30:49.927000 audit: BPF prog-id=168 op=UNLOAD Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:49.928000 audit: BPF prog-id=170 op=LOAD Feb 12 19:30:49.928000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3553 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:49.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356137663130323166376563653461663530643763656438303731 Feb 12 19:30:49.946201 env[1141]: time="2024-02-12T19:30:49.946144961Z" level=info msg="StartContainer for \"f55a7f1021f7ece4af50d7ced8071e697e5ab4136aafe07de1988895e004cdf4\" returns successfully" Feb 12 19:30:50.220104 kubelet[2002]: E0212 19:30:50.220006 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:50.223235 kubelet[2002]: E0212 19:30:50.223129 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:50.235099 kubelet[2002]: I0212 19:30:50.234850 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-5k7dh" podStartSLOduration=30.234811216 podCreationTimestamp="2024-02-12 19:30:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:30:50.234649132 +0000 UTC m=+44.251705674" watchObservedRunningTime="2024-02-12 19:30:50.234811216 +0000 UTC m=+44.251867718" Feb 12 19:30:50.265000 audit[3748]: NETFILTER_CFG table=filter:106 family=2 entries=14 op=nft_register_rule pid=3748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.265000 audit[3748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe98c2470 a2=0 a3=ffff85c446c0 items=0 ppid=2151 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.266000 audit[3748]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.266000 audit[3748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffe98c2470 a2=0 a3=ffff85c446c0 items=0 ppid=2151 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.284145 kubelet[2002]: I0212 19:30:50.284093 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-frmtd" podStartSLOduration=30.284051543 podCreationTimestamp="2024-02-12 19:30:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:30:50.259540743 +0000 UTC m=+44.276597245" watchObservedRunningTime="2024-02-12 19:30:50.284051543 +0000 UTC m=+44.301108085" Feb 12 19:30:50.291000 audit[3750]: NETFILTER_CFG table=filter:108 family=2 entries=11 op=nft_register_rule pid=3750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.291000 audit[3750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd2709840 a2=0 a3=ffffa57e16c0 items=0 ppid=2151 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.293000 audit[3750]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=3750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:50.293000 audit[3750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffd2709840 a2=0 a3=ffffa57e16c0 items=0 ppid=2151 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:50.367964 systemd[1]: run-netns-cni\x2d4232c4aa\x2d109b\x2dc72f\x2d61b3\x2df75c3b3b050b.mount: Deactivated successfully. Feb 12 19:30:50.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.116:22-10.0.0.1:38240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:50.719933 systemd[1]: Started sshd@11-10.0.0.116:22-10.0.0.1:38240.service. Feb 12 19:30:50.724172 sshd[3540]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:50.723000 audit[3540]: USER_END pid=3540 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.723000 audit[3540]: CRED_DISP pid=3540 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.728682 systemd[1]: sshd@10-10.0.0.116:22-10.0.0.1:38226.service: Deactivated successfully. Feb 12 19:30:50.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.116:22-10.0.0.1:38226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:50.729553 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:30:50.732401 systemd-logind[1125]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:30:50.734078 systemd-logind[1125]: Removed session 11. Feb 12 19:30:50.770000 audit[3754]: USER_ACCT pid=3754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.772646 sshd[3754]: Accepted publickey for core from 10.0.0.1 port 38240 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:50.772000 audit[3754]: CRED_ACQ pid=3754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.772000 audit[3754]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5fe6390 a2=3 a3=1 items=0 ppid=1 pid=3754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:50.772000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:50.774279 sshd[3754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:50.778027 systemd-logind[1125]: New session 12 of user core. Feb 12 19:30:50.779017 systemd[1]: Started session-12.scope. Feb 12 19:30:50.780000 audit[3754]: USER_START pid=3754 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.782000 audit[3757]: CRED_ACQ pid=3757 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.904270 sshd[3754]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:50.903000 audit[3754]: USER_END pid=3754 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.903000 audit[3754]: CRED_DISP pid=3754 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:50.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.116:22-10.0.0.1:38240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:50.907083 systemd[1]: sshd@11-10.0.0.116:22-10.0.0.1:38240.service: Deactivated successfully. Feb 12 19:30:50.907991 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:30:50.908558 systemd-logind[1125]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:30:50.909217 systemd-logind[1125]: Removed session 12. Feb 12 19:30:51.143027 systemd-networkd[1040]: cali60beeb05184: Gained IPv6LL Feb 12 19:30:51.226435 kubelet[2002]: E0212 19:30:51.226410 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:51.226435 kubelet[2002]: E0212 19:30:51.226421 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:51.270459 systemd-networkd[1040]: cali90edda09400: Gained IPv6LL Feb 12 19:30:51.311000 audit[3770]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:51.311000 audit[3770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff1b1ff50 a2=0 a3=ffffa71d96c0 items=0 ppid=2151 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:51.326000 audit[3770]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:30:51.326000 audit[3770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=fffff1b1ff50 a2=0 a3=ffffa71d96c0 items=0 ppid=2151 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:30:51.590035 systemd-networkd[1040]: calid8cd01479d6: Gained IPv6LL Feb 12 19:30:51.742879 env[1141]: time="2024-02-12T19:30:51.742814449Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:51.744421 env[1141]: time="2024-02-12T19:30:51.744381372Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:51.746216 env[1141]: time="2024-02-12T19:30:51.746181981Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:51.747548 env[1141]: time="2024-02-12T19:30:51.747502456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:51.748043 env[1141]: time="2024-02-12T19:30:51.748015270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 19:30:51.756699 env[1141]: time="2024-02-12T19:30:51.754400203Z" level=info msg="CreateContainer within sandbox \"3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:30:51.766820 env[1141]: time="2024-02-12T19:30:51.766764019Z" level=info msg="CreateContainer within sandbox \"3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"10eb6fd1d2e42a860d0e1ce295c3b11b5f10683bcf010793d264089702a9be61\"" Feb 12 19:30:51.767520 env[1141]: time="2024-02-12T19:30:51.767488998Z" level=info msg="StartContainer for \"10eb6fd1d2e42a860d0e1ce295c3b11b5f10683bcf010793d264089702a9be61\"" Feb 12 19:30:51.785064 systemd[1]: Started cri-containerd-10eb6fd1d2e42a860d0e1ce295c3b11b5f10683bcf010793d264089702a9be61.scope. Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.826000 audit: BPF prog-id=171 op=LOAD Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3608 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656236666431643265343261383630643065316365323935633362 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3608 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656236666431643265343261383630643065316365323935633362 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit: BPF prog-id=172 op=LOAD Feb 12 19:30:51.827000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3608 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656236666431643265343261383630643065316365323935633362 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit: BPF prog-id=173 op=LOAD Feb 12 19:30:51.827000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3608 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656236666431643265343261383630643065316365323935633362 Feb 12 19:30:51.827000 audit: BPF prog-id=173 op=UNLOAD Feb 12 19:30:51.827000 audit: BPF prog-id=172 op=UNLOAD Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:51.827000 audit: BPF prog-id=174 op=LOAD Feb 12 19:30:51.827000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3608 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:51.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656236666431643265343261383630643065316365323935633362 Feb 12 19:30:51.849333 env[1141]: time="2024-02-12T19:30:51.848711241Z" level=info msg="StartContainer for \"10eb6fd1d2e42a860d0e1ce295c3b11b5f10683bcf010793d264089702a9be61\" returns successfully" Feb 12 19:30:52.230010 kubelet[2002]: E0212 19:30:52.229878 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:52.231291 kubelet[2002]: E0212 19:30:52.231265 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:52.242815 kubelet[2002]: I0212 19:30:52.242780 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-75689bd899-lmj4f" podStartSLOduration=25.379138271 podCreationTimestamp="2024-02-12 19:30:25 +0000 UTC" firstStartedPulling="2024-02-12 19:30:49.884671171 +0000 UTC m=+43.901727713" lastFinishedPulling="2024-02-12 19:30:51.748276357 +0000 UTC m=+45.765332859" observedRunningTime="2024-02-12 19:30:52.241231017 +0000 UTC m=+46.258287559" watchObservedRunningTime="2024-02-12 19:30:52.242743417 +0000 UTC m=+46.259799959" Feb 12 19:30:52.597604 kubelet[2002]: I0212 19:30:52.596930 2002 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:30:52.597764 kubelet[2002]: E0212 19:30:52.597697 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:53.232490 kubelet[2002]: E0212 19:30:53.232444 2002 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:30:54.088311 env[1141]: time="2024-02-12T19:30:54.088069931Z" level=info msg="StopPodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\"" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.137 [INFO][3909] k8s.go 578: Cleaning up netns ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.137 [INFO][3909] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" iface="eth0" netns="/var/run/netns/cni-fcaa7895-dead-ec0b-1139-15365ed84be2" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.137 [INFO][3909] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" iface="eth0" netns="/var/run/netns/cni-fcaa7895-dead-ec0b-1139-15365ed84be2" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.138 [INFO][3909] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" iface="eth0" netns="/var/run/netns/cni-fcaa7895-dead-ec0b-1139-15365ed84be2" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.138 [INFO][3909] k8s.go 585: Releasing IP address(es) ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.138 [INFO][3909] utils.go 188: Calico CNI releasing IP address ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.161 [INFO][3917] ipam_plugin.go 415: Releasing address using handleID ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.161 [INFO][3917] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.161 [INFO][3917] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.172 [WARNING][3917] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.172 [INFO][3917] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.174 [INFO][3917] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:54.180250 env[1141]: 2024-02-12 19:30:54.178 [INFO][3909] k8s.go 591: Teardown processing complete. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:30:54.180711 env[1141]: time="2024-02-12T19:30:54.180406035Z" level=info msg="TearDown network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" successfully" Feb 12 19:30:54.180711 env[1141]: time="2024-02-12T19:30:54.180437156Z" level=info msg="StopPodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" returns successfully" Feb 12 19:30:54.182509 systemd[1]: run-netns-cni\x2dfcaa7895\x2ddead\x2dec0b\x2d1139\x2d15365ed84be2.mount: Deactivated successfully. Feb 12 19:30:54.183433 env[1141]: time="2024-02-12T19:30:54.183402591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25l5n,Uid:adc19104-1eb1-4629-b6c0-6317ec29da48,Namespace:calico-system,Attempt:1,}" Feb 12 19:30:54.307044 systemd-networkd[1040]: cali77477e19412: Link UP Feb 12 19:30:54.308243 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:30:54.308424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77477e19412: link becomes ready Feb 12 19:30:54.308562 systemd-networkd[1040]: cali77477e19412: Gained carrier Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.237 [INFO][3925] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--25l5n-eth0 csi-node-driver- calico-system adc19104-1eb1-4629-b6c0-6317ec29da48 902 0 2024-02-12 19:30:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-25l5n eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali77477e19412 [] []}} ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.237 [INFO][3925] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.260 [INFO][3941] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" HandleID="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.272 [INFO][3941] ipam_plugin.go 268: Auto assigning IP ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" HandleID="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000243a80), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-25l5n", "timestamp":"2024-02-12 19:30:54.260775756 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.273 [INFO][3941] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.273 [INFO][3941] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.273 [INFO][3941] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.274 [INFO][3941] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.278 [INFO][3941] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.282 [INFO][3941] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.284 [INFO][3941] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.286 [INFO][3941] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.286 [INFO][3941] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.288 [INFO][3941] ipam.go 1682: Creating new handle: k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8 Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.291 [INFO][3941] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.297 [INFO][3941] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.297 [INFO][3941] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" host="localhost" Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.297 [INFO][3941] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:30:54.321295 env[1141]: 2024-02-12 19:30:54.297 [INFO][3941] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" HandleID="k8s-pod-network.89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.321943 env[1141]: 2024-02-12 19:30:54.305 [INFO][3925] k8s.go 385: Populated endpoint ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--25l5n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"adc19104-1eb1-4629-b6c0-6317ec29da48", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-25l5n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77477e19412", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:54.321943 env[1141]: 2024-02-12 19:30:54.305 [INFO][3925] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.321943 env[1141]: 2024-02-12 19:30:54.305 [INFO][3925] dataplane_linux.go 68: Setting the host side veth name to cali77477e19412 ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.321943 env[1141]: 2024-02-12 19:30:54.309 [INFO][3925] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.321943 env[1141]: 2024-02-12 19:30:54.310 [INFO][3925] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--25l5n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"adc19104-1eb1-4629-b6c0-6317ec29da48", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8", Pod:"csi-node-driver-25l5n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77477e19412", MAC:"8a:b8:fc:97:5d:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:30:54.321943 env[1141]: 2024-02-12 19:30:54.318 [INFO][3925] k8s.go 491: Wrote updated endpoint to datastore ContainerID="89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8" Namespace="calico-system" Pod="csi-node-driver-25l5n" WorkloadEndpoint="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:30:54.331000 audit[3968]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:30:54.331000 audit[3968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffdf1030c0 a2=0 a3=ffff90926fa8 items=0 ppid=3082 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:54.331000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:30:54.333997 env[1141]: time="2024-02-12T19:30:54.333916052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:30:54.334103 env[1141]: time="2024-02-12T19:30:54.334011655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:30:54.334103 env[1141]: time="2024-02-12T19:30:54.334055576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:30:54.334333 env[1141]: time="2024-02-12T19:30:54.334290542Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8 pid=3971 runtime=io.containerd.runc.v2 Feb 12 19:30:54.348016 systemd[1]: Started cri-containerd-89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8.scope. Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.366000 audit: BPF prog-id=175 op=LOAD Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3971 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:54.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383138663661316437626464336138656538643162306461303233 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3971 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:54.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383138663661316437626464336138656538643162306461303233 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit: BPF prog-id=176 op=LOAD Feb 12 19:30:54.367000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3971 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:54.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383138663661316437626464336138656538643162306461303233 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit: BPF prog-id=177 op=LOAD Feb 12 19:30:54.368671 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:30:54.367000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3971 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:54.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383138663661316437626464336138656538643162306461303233 Feb 12 19:30:54.367000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:30:54.367000 audit: BPF prog-id=176 op=UNLOAD Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:54.367000 audit: BPF prog-id=178 op=LOAD Feb 12 19:30:54.367000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3971 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:54.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383138663661316437626464336138656538643162306461303233 Feb 12 19:30:54.379437 env[1141]: time="2024-02-12T19:30:54.379390687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25l5n,Uid:adc19104-1eb1-4629-b6c0-6317ec29da48,Namespace:calico-system,Attempt:1,} returns sandbox id \"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8\"" Feb 12 19:30:54.382632 env[1141]: time="2024-02-12T19:30:54.382604849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:30:55.182503 systemd[1]: run-containerd-runc-k8s.io-89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8-runc.wLZR8t.mount: Deactivated successfully. Feb 12 19:30:55.686975 systemd-networkd[1040]: cali77477e19412: Gained IPv6LL Feb 12 19:30:55.760998 env[1141]: time="2024-02-12T19:30:55.760956258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:55.766347 env[1141]: time="2024-02-12T19:30:55.766296511Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:55.767590 env[1141]: time="2024-02-12T19:30:55.767560223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:55.771433 env[1141]: time="2024-02-12T19:30:55.769928802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:55.771433 env[1141]: time="2024-02-12T19:30:55.770755582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:30:55.775111 env[1141]: time="2024-02-12T19:30:55.775073450Z" level=info msg="CreateContainer within sandbox \"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:30:55.791573 env[1141]: time="2024-02-12T19:30:55.791507899Z" level=info msg="CreateContainer within sandbox \"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"51380d7d7557e2d619883704f55904844afb58e7fc29d8c98bd4684673fbe1ed\"" Feb 12 19:30:55.792070 env[1141]: time="2024-02-12T19:30:55.792042672Z" level=info msg="StartContainer for \"51380d7d7557e2d619883704f55904844afb58e7fc29d8c98bd4684673fbe1ed\"" Feb 12 19:30:55.814839 systemd[1]: Started cri-containerd-51380d7d7557e2d619883704f55904844afb58e7fc29d8c98bd4684673fbe1ed.scope. Feb 12 19:30:55.859760 kernel: kauditd_printk_skb: 452 callbacks suppressed Feb 12 19:30:55.859895 kernel: audit: type=1400 audit(1707766255.852:1313): avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.859929 kernel: audit: type=1300 audit(1707766255.852:1313): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3971 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.852000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.852000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3971 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333830643764373535376532643631393838333730346635353930 Feb 12 19:30:55.863444 kernel: audit: type=1327 audit(1707766255.852:1313): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333830643764373535376532643631393838333730346635353930 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.868263 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.868321 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.871996 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.874479 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.876503 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.878477 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.880648 kernel: audit: type=1400 audit(1707766255.853:1314): avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit: BPF prog-id=179 op=LOAD Feb 12 19:30:55.853000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3971 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333830643764373535376532643631393838333730346635353930 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.853000 audit: BPF prog-id=180 op=LOAD Feb 12 19:30:55.853000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3971 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333830643764373535376532643631393838333730346635353930 Feb 12 19:30:55.855000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:30:55.855000 audit: BPF prog-id=179 op=UNLOAD Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:55.856000 audit: BPF prog-id=181 op=LOAD Feb 12 19:30:55.856000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3971 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333830643764373535376532643631393838333730346635353930 Feb 12 19:30:55.892577 env[1141]: time="2024-02-12T19:30:55.892534332Z" level=info msg="StartContainer for \"51380d7d7557e2d619883704f55904844afb58e7fc29d8c98bd4684673fbe1ed\" returns successfully" Feb 12 19:30:55.894128 env[1141]: time="2024-02-12T19:30:55.894097851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:30:55.910293 systemd[1]: Started sshd@12-10.0.0.116:22-10.0.0.1:44100.service. Feb 12 19:30:55.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.116:22-10.0.0.1:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:55.970000 audit[4038]: USER_ACCT pid=4038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:55.972412 sshd[4038]: Accepted publickey for core from 10.0.0.1 port 44100 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:30:55.975000 audit[4038]: CRED_ACQ pid=4038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:55.975000 audit[4038]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa47d890 a2=3 a3=1 items=0 ppid=1 pid=4038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:55.975000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:30:55.977567 sshd[4038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:30:55.983516 systemd-logind[1125]: New session 13 of user core. Feb 12 19:30:55.983554 systemd[1]: Started session-13.scope. Feb 12 19:30:55.993000 audit[4038]: USER_START pid=4038 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:55.994000 audit[4040]: CRED_ACQ pid=4040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:56.175152 sshd[4038]: pam_unix(sshd:session): session closed for user core Feb 12 19:30:56.176000 audit[4038]: USER_END pid=4038 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:56.176000 audit[4038]: CRED_DISP pid=4038 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:30:56.178665 systemd[1]: sshd@12-10.0.0.116:22-10.0.0.1:44100.service: Deactivated successfully. Feb 12 19:30:56.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.116:22-10.0.0.1:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:30:56.179552 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:30:56.180630 systemd-logind[1125]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:30:56.181416 systemd-logind[1125]: Removed session 13. Feb 12 19:30:57.295838 env[1141]: time="2024-02-12T19:30:57.295788385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:57.297954 env[1141]: time="2024-02-12T19:30:57.297921076Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:57.299290 env[1141]: time="2024-02-12T19:30:57.299253708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:57.300563 env[1141]: time="2024-02-12T19:30:57.300514938Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:30:57.300934 env[1141]: time="2024-02-12T19:30:57.300883027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:30:57.303008 env[1141]: time="2024-02-12T19:30:57.302967597Z" level=info msg="CreateContainer within sandbox \"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:30:57.318585 env[1141]: time="2024-02-12T19:30:57.318515329Z" level=info msg="CreateContainer within sandbox \"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"45333559dc149540f77710221b004e8cad687fe6c1b66e0dfa90ff28a1536a6d\"" Feb 12 19:30:57.319036 env[1141]: time="2024-02-12T19:30:57.319007261Z" level=info msg="StartContainer for \"45333559dc149540f77710221b004e8cad687fe6c1b66e0dfa90ff28a1536a6d\"" Feb 12 19:30:57.351358 systemd[1]: Started cri-containerd-45333559dc149540f77710221b004e8cad687fe6c1b66e0dfa90ff28a1536a6d.scope. Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3971 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:57.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333333353539646331343935343066373737313032323162303034 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.371000 audit: BPF prog-id=182 op=LOAD Feb 12 19:30:57.371000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3971 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:57.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333333353539646331343935343066373737313032323162303034 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.372000 audit: BPF prog-id=183 op=LOAD Feb 12 19:30:57.372000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3971 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:57.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333333353539646331343935343066373737313032323162303034 Feb 12 19:30:57.373000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:30:57.373000 audit: BPF prog-id=182 op=UNLOAD Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:30:57.373000 audit: BPF prog-id=184 op=LOAD Feb 12 19:30:57.373000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3971 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:30:57.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333333353539646331343935343066373737313032323162303034 Feb 12 19:30:57.398841 env[1141]: time="2024-02-12T19:30:57.398794413Z" level=info msg="StartContainer for \"45333559dc149540f77710221b004e8cad687fe6c1b66e0dfa90ff28a1536a6d\" returns successfully" Feb 12 19:30:58.203081 kubelet[2002]: I0212 19:30:58.202976 2002 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:30:58.203081 kubelet[2002]: I0212 19:30:58.203064 2002 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:30:58.270416 kubelet[2002]: I0212 19:30:58.270072 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-25l5n" podStartSLOduration=30.349528466 podCreationTimestamp="2024-02-12 19:30:25 +0000 UTC" firstStartedPulling="2024-02-12 19:30:54.38068416 +0000 UTC m=+48.397740662" lastFinishedPulling="2024-02-12 19:30:57.301191834 +0000 UTC m=+51.318248376" observedRunningTime="2024-02-12 19:30:58.269522288 +0000 UTC m=+52.286578830" watchObservedRunningTime="2024-02-12 19:30:58.27003618 +0000 UTC m=+52.287092682" Feb 12 19:31:01.183568 systemd[1]: Started sshd@13-10.0.0.116:22-10.0.0.1:44116.service. Feb 12 19:31:01.186574 kernel: kauditd_printk_skb: 87 callbacks suppressed Feb 12 19:31:01.186627 kernel: audit: type=1130 audit(1707766261.182:1334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.116:22-10.0.0.1:44116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:01.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.116:22-10.0.0.1:44116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:01.229000 audit[4096]: USER_ACCT pid=4096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.230222 sshd[4096]: Accepted publickey for core from 10.0.0.1 port 44116 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:01.231742 sshd[4096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:01.230000 audit[4096]: CRED_ACQ pid=4096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.235849 kernel: audit: type=1101 audit(1707766261.229:1335): pid=4096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.235938 kernel: audit: type=1103 audit(1707766261.230:1336): pid=4096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.235962 kernel: audit: type=1006 audit(1707766261.230:1337): pid=4096 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 19:31:01.235563 systemd-logind[1125]: New session 14 of user core. Feb 12 19:31:01.236473 systemd[1]: Started session-14.scope. Feb 12 19:31:01.230000 audit[4096]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5049720 a2=3 a3=1 items=0 ppid=1 pid=4096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:01.240651 kernel: audit: type=1300 audit(1707766261.230:1337): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5049720 a2=3 a3=1 items=0 ppid=1 pid=4096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:01.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:01.241878 kernel: audit: type=1327 audit(1707766261.230:1337): proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:01.241000 audit[4096]: USER_START pid=4096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.241000 audit[4098]: CRED_ACQ pid=4098 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.247600 kernel: audit: type=1105 audit(1707766261.241:1338): pid=4096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.247664 kernel: audit: type=1103 audit(1707766261.241:1339): pid=4098 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.357837 sshd[4096]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:01.358000 audit[4096]: USER_END pid=4096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.360925 systemd[1]: sshd@13-10.0.0.116:22-10.0.0.1:44116.service: Deactivated successfully. Feb 12 19:31:01.358000 audit[4096]: CRED_DISP pid=4096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.361815 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:31:01.362483 systemd-logind[1125]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:31:01.363365 systemd-logind[1125]: Removed session 14. Feb 12 19:31:01.363912 kernel: audit: type=1106 audit(1707766261.358:1340): pid=4096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.363967 kernel: audit: type=1104 audit(1707766261.358:1341): pid=4096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:01.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.116:22-10.0.0.1:44116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:02.989000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:02.989000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:02.989000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4003a13900 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:31:02.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:31:02.989000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4008cf0180 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:31:02.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:31:02.990000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:02.990000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4008cf0270 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:31:02.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:31:02.993000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:02.993000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400957c480 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:31:02.993000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:31:03.007000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:03.007000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:03.007000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400957c5a0 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:31:03.007000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:31:03.007000 audit[1888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400b32f860 a2=fc6 a3=0 items=0 ppid=1723 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c346 key=(null) Feb 12 19:31:03.007000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 19:31:03.105000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:03.105000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024e8560 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:03.105000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:03.105000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:03.105000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027f4000 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:03.105000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:04.481194 kubelet[2002]: I0212 19:31:04.481152 2002 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:31:04.486575 systemd[1]: Created slice kubepods-besteffort-pod125072d5_181f_4c8b_bd30_c291ce81b644.slice. Feb 12 19:31:04.488000 audit[4118]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.488000 audit[4118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcda2c3c0 a2=0 a3=ffffb46916c0 items=0 ppid=2151 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.489000 audit[4118]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.489000 audit[4118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcda2c3c0 a2=0 a3=ffffb46916c0 items=0 ppid=2151 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.502000 audit[4120]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.502000 audit[4120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc2dd1670 a2=0 a3=ffff911956c0 items=0 ppid=2151 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.503000 audit[4120]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:04.503000 audit[4120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc2dd1670 a2=0 a3=ffff911956c0 items=0 ppid=2151 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:04.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:04.679559 kubelet[2002]: I0212 19:31:04.679489 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/125072d5-181f-4c8b-bd30-c291ce81b644-calico-apiserver-certs\") pod \"calico-apiserver-6947dd49d9-ljchv\" (UID: \"125072d5-181f-4c8b-bd30-c291ce81b644\") " pod="calico-apiserver/calico-apiserver-6947dd49d9-ljchv" Feb 12 19:31:04.679874 kubelet[2002]: I0212 19:31:04.679835 2002 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fkhv4\" (UniqueName: \"kubernetes.io/projected/125072d5-181f-4c8b-bd30-c291ce81b644-kube-api-access-fkhv4\") pod \"calico-apiserver-6947dd49d9-ljchv\" (UID: \"125072d5-181f-4c8b-bd30-c291ce81b644\") " pod="calico-apiserver/calico-apiserver-6947dd49d9-ljchv" Feb 12 19:31:05.091293 env[1141]: time="2024-02-12T19:31:05.091238565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6947dd49d9-ljchv,Uid:125072d5-181f-4c8b-bd30-c291ce81b644,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:31:05.201320 systemd-networkd[1040]: califf0543331cf: Link UP Feb 12 19:31:05.203378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:31:05.203422 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf0543331cf: link becomes ready Feb 12 19:31:05.203592 systemd-networkd[1040]: califf0543331cf: Gained carrier Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.133 [INFO][4123] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0 calico-apiserver-6947dd49d9- calico-apiserver 125072d5-181f-4c8b-bd30-c291ce81b644 1005 0 2024-02-12 19:31:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6947dd49d9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6947dd49d9-ljchv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califf0543331cf [] []}} ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.133 [INFO][4123] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.160 [INFO][4136] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" HandleID="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Workload="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.172 [INFO][4136] ipam_plugin.go 268: Auto assigning IP ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" HandleID="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Workload="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029da70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6947dd49d9-ljchv", "timestamp":"2024-02-12 19:31:05.160321834 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.172 [INFO][4136] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.172 [INFO][4136] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.172 [INFO][4136] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.174 [INFO][4136] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.177 [INFO][4136] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.182 [INFO][4136] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.184 [INFO][4136] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.186 [INFO][4136] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.186 [INFO][4136] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.188 [INFO][4136] ipam.go 1682: Creating new handle: k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894 Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.191 [INFO][4136] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.196 [INFO][4136] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.196 [INFO][4136] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" host="localhost" Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.196 [INFO][4136] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:05.217074 env[1141]: 2024-02-12 19:31:05.196 [INFO][4136] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" HandleID="k8s-pod-network.672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Workload="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.217621 env[1141]: 2024-02-12 19:31:05.198 [INFO][4123] k8s.go 385: Populated endpoint ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0", GenerateName:"calico-apiserver-6947dd49d9-", Namespace:"calico-apiserver", SelfLink:"", UID:"125072d5-181f-4c8b-bd30-c291ce81b644", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6947dd49d9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6947dd49d9-ljchv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf0543331cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:05.217621 env[1141]: 2024-02-12 19:31:05.198 [INFO][4123] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.217621 env[1141]: 2024-02-12 19:31:05.198 [INFO][4123] dataplane_linux.go 68: Setting the host side veth name to califf0543331cf ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.217621 env[1141]: 2024-02-12 19:31:05.204 [INFO][4123] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.217621 env[1141]: 2024-02-12 19:31:05.204 [INFO][4123] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0", GenerateName:"calico-apiserver-6947dd49d9-", Namespace:"calico-apiserver", SelfLink:"", UID:"125072d5-181f-4c8b-bd30-c291ce81b644", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 31, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6947dd49d9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894", Pod:"calico-apiserver-6947dd49d9-ljchv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf0543331cf", MAC:"72:2a:08:ae:64:86", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:05.217621 env[1141]: 2024-02-12 19:31:05.213 [INFO][4123] k8s.go 491: Wrote updated endpoint to datastore ContainerID="672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894" Namespace="calico-apiserver" Pod="calico-apiserver-6947dd49d9-ljchv" WorkloadEndpoint="localhost-k8s-calico--apiserver--6947dd49d9--ljchv-eth0" Feb 12 19:31:05.232070 env[1141]: time="2024-02-12T19:31:05.229964956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:31:05.232070 env[1141]: time="2024-02-12T19:31:05.230010277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:31:05.232070 env[1141]: time="2024-02-12T19:31:05.230020197Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:31:05.232070 env[1141]: time="2024-02-12T19:31:05.230141080Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894 pid=4173 runtime=io.containerd.runc.v2 Feb 12 19:31:05.233000 audit[4178]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=4178 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:31:05.233000 audit[4178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffc5d552a0 a2=0 a3=ffff99c17fa8 items=0 ppid=3082 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.233000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:31:05.254708 systemd[1]: Started cri-containerd-672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894.scope. Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit: BPF prog-id=185 op=LOAD Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4173 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637326632333664313034363362353761663864323431373066336330 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4173 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637326632333664313034363362353761663864323431373066336330 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.277000 audit: BPF prog-id=186 op=LOAD Feb 12 19:31:05.277000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4173 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637326632333664313034363362353761663864323431373066336330 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit: BPF prog-id=187 op=LOAD Feb 12 19:31:05.278000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4173 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637326632333664313034363362353761663864323431373066336330 Feb 12 19:31:05.278000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:31:05.278000 audit: BPF prog-id=186 op=UNLOAD Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:05.278000 audit: BPF prog-id=188 op=LOAD Feb 12 19:31:05.278000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4173 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:05.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637326632333664313034363362353761663864323431373066336330 Feb 12 19:31:05.279651 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:31:05.298027 env[1141]: time="2024-02-12T19:31:05.297980563Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6947dd49d9-ljchv,Uid:125072d5-181f-4c8b-bd30-c291ce81b644,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894\"" Feb 12 19:31:05.299524 env[1141]: time="2024-02-12T19:31:05.299473235Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:31:06.098952 env[1141]: time="2024-02-12T19:31:06.098906780Z" level=info msg="StopPodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\"" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.156 [WARNING][4223] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--frmtd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"50dd4007-e567-44a4-8534-c0500ed637cc", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da", Pod:"coredns-5d78c9869d-frmtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90edda09400", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.157 [INFO][4223] k8s.go 578: Cleaning up netns ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.157 [INFO][4223] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" iface="eth0" netns="" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.157 [INFO][4223] k8s.go 585: Releasing IP address(es) ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.157 [INFO][4223] utils.go 188: Calico CNI releasing IP address ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.173 [INFO][4230] ipam_plugin.go 415: Releasing address using handleID ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.173 [INFO][4230] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.173 [INFO][4230] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.182 [WARNING][4230] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.182 [INFO][4230] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.184 [INFO][4230] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.189087 env[1141]: 2024-02-12 19:31:06.186 [INFO][4223] k8s.go 591: Teardown processing complete. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.189509 env[1141]: time="2024-02-12T19:31:06.189109717Z" level=info msg="TearDown network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" successfully" Feb 12 19:31:06.189509 env[1141]: time="2024-02-12T19:31:06.189134798Z" level=info msg="StopPodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" returns successfully" Feb 12 19:31:06.189996 env[1141]: time="2024-02-12T19:31:06.189964935Z" level=info msg="RemovePodSandbox for \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\"" Feb 12 19:31:06.190046 env[1141]: time="2024-02-12T19:31:06.190004696Z" level=info msg="Forcibly stopping sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\"" Feb 12 19:31:06.248034 systemd-networkd[1040]: califf0543331cf: Gained IPv6LL Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.223 [WARNING][4253] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--frmtd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"50dd4007-e567-44a4-8534-c0500ed637cc", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dd7ef7a5ff1fb1b907da246338bf0181aca040f9b0496cca1d897cfa749f26da", Pod:"coredns-5d78c9869d-frmtd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90edda09400", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.223 [INFO][4253] k8s.go 578: Cleaning up netns ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.223 [INFO][4253] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" iface="eth0" netns="" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.223 [INFO][4253] k8s.go 585: Releasing IP address(es) ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.223 [INFO][4253] utils.go 188: Calico CNI releasing IP address ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.241 [INFO][4261] ipam_plugin.go 415: Releasing address using handleID ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.241 [INFO][4261] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.241 [INFO][4261] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.252 [WARNING][4261] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.253 [INFO][4261] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" HandleID="k8s-pod-network.7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Workload="localhost-k8s-coredns--5d78c9869d--frmtd-eth0" Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.255 [INFO][4261] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.258133 env[1141]: 2024-02-12 19:31:06.256 [INFO][4253] k8s.go 591: Teardown processing complete. ContainerID="7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55" Feb 12 19:31:06.258563 env[1141]: time="2024-02-12T19:31:06.258149929Z" level=info msg="TearDown network for sandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" successfully" Feb 12 19:31:06.261509 env[1141]: time="2024-02-12T19:31:06.261474759Z" level=info msg="RemovePodSandbox \"7d5eb12332549e64b234bb94f2b07d726ab7c898f98da49cf3877985af805c55\" returns successfully" Feb 12 19:31:06.262064 env[1141]: time="2024-02-12T19:31:06.262042251Z" level=info msg="StopPodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\"" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.307 [WARNING][4284] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--25l5n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"adc19104-1eb1-4629-b6c0-6317ec29da48", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8", Pod:"csi-node-driver-25l5n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77477e19412", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.308 [INFO][4284] k8s.go 578: Cleaning up netns ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.308 [INFO][4284] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" iface="eth0" netns="" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.308 [INFO][4284] k8s.go 585: Releasing IP address(es) ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.308 [INFO][4284] utils.go 188: Calico CNI releasing IP address ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.326 [INFO][4291] ipam_plugin.go 415: Releasing address using handleID ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.326 [INFO][4291] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.326 [INFO][4291] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.337 [WARNING][4291] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.337 [INFO][4291] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.339 [INFO][4291] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.344236 env[1141]: 2024-02-12 19:31:06.341 [INFO][4284] k8s.go 591: Teardown processing complete. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.344236 env[1141]: time="2024-02-12T19:31:06.344225539Z" level=info msg="TearDown network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" successfully" Feb 12 19:31:06.344666 env[1141]: time="2024-02-12T19:31:06.344256700Z" level=info msg="StopPodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" returns successfully" Feb 12 19:31:06.344780 env[1141]: time="2024-02-12T19:31:06.344725869Z" level=info msg="RemovePodSandbox for \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\"" Feb 12 19:31:06.344826 env[1141]: time="2024-02-12T19:31:06.344774870Z" level=info msg="Forcibly stopping sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\"" Feb 12 19:31:06.363207 systemd[1]: Started sshd@14-10.0.0.116:22-10.0.0.1:37912.service. Feb 12 19:31:06.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.116:22-10.0.0.1:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:06.365317 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 12 19:31:06.365382 kernel: audit: type=1130 audit(1707766266.362:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.116:22-10.0.0.1:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:06.417000 audit[4335]: USER_ACCT pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.419056 sshd[4335]: Accepted publickey for core from 10.0.0.1 port 37912 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:06.419878 sshd[4335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:06.418000 audit[4335]: CRED_ACQ pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.424109 kernel: audit: type=1101 audit(1707766266.417:1375): pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.424154 kernel: audit: type=1103 audit(1707766266.418:1376): pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.424180 kernel: audit: type=1006 audit(1707766266.418:1377): pid=4335 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:31:06.426443 kernel: audit: type=1300 audit(1707766266.418:1377): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7f38b10 a2=3 a3=1 items=0 ppid=1 pid=4335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.418000 audit[4335]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7f38b10 a2=3 a3=1 items=0 ppid=1 pid=4335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:06.426643 systemd-logind[1125]: New session 15 of user core. Feb 12 19:31:06.429020 kernel: audit: type=1327 audit(1707766266.418:1377): proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:06.418000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:06.427507 systemd[1]: Started session-15.scope. Feb 12 19:31:06.431000 audit[4335]: USER_START pid=4335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.432000 audit[4349]: CRED_ACQ pid=4349 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.437564 kernel: audit: type=1105 audit(1707766266.431:1378): pid=4335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.437601 kernel: audit: type=1103 audit(1707766266.432:1379): pid=4349 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.413 [WARNING][4322] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--25l5n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"adc19104-1eb1-4629-b6c0-6317ec29da48", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89818f6a1d7bdd3a8ee8d1b0da023943c91cd342d50d51053e6abb721b7aaaf8", Pod:"csi-node-driver-25l5n", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77477e19412", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.414 [INFO][4322] k8s.go 578: Cleaning up netns ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.414 [INFO][4322] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" iface="eth0" netns="" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.414 [INFO][4322] k8s.go 585: Releasing IP address(es) ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.414 [INFO][4322] utils.go 188: Calico CNI releasing IP address ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.450 [INFO][4344] ipam_plugin.go 415: Releasing address using handleID ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.450 [INFO][4344] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.451 [INFO][4344] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.460 [WARNING][4344] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.460 [INFO][4344] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" HandleID="k8s-pod-network.ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Workload="localhost-k8s-csi--node--driver--25l5n-eth0" Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.461 [INFO][4344] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.464617 env[1141]: 2024-02-12 19:31:06.463 [INFO][4322] k8s.go 591: Teardown processing complete. ContainerID="ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314" Feb 12 19:31:06.465066 env[1141]: time="2024-02-12T19:31:06.464643391Z" level=info msg="TearDown network for sandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" successfully" Feb 12 19:31:06.467023 env[1141]: time="2024-02-12T19:31:06.466992681Z" level=info msg="RemovePodSandbox \"ef106af477382e99f02ba6852b407a43762a44cd8aacc8cab0a9f554433c1314\" returns successfully" Feb 12 19:31:06.467494 env[1141]: time="2024-02-12T19:31:06.467473011Z" level=info msg="StopPodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\"" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.504 [WARNING][4367] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0", GenerateName:"calico-kube-controllers-75689bd899-", Namespace:"calico-system", SelfLink:"", UID:"c9935352-f103-4b61-876e-54da2abe1d04", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75689bd899", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da", Pod:"calico-kube-controllers-75689bd899-lmj4f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8cd01479d6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.504 [INFO][4367] k8s.go 578: Cleaning up netns ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.504 [INFO][4367] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" iface="eth0" netns="" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.504 [INFO][4367] k8s.go 585: Releasing IP address(es) ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.504 [INFO][4367] utils.go 188: Calico CNI releasing IP address ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.530 [INFO][4383] ipam_plugin.go 415: Releasing address using handleID ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.530 [INFO][4383] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.530 [INFO][4383] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.539 [WARNING][4383] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.540 [INFO][4383] ipam_plugin.go 443: Releasing address using workloadID ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.541 [INFO][4383] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.550395 env[1141]: 2024-02-12 19:31:06.544 [INFO][4367] k8s.go 591: Teardown processing complete. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.550395 env[1141]: time="2024-02-12T19:31:06.549055606Z" level=info msg="TearDown network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" successfully" Feb 12 19:31:06.550395 env[1141]: time="2024-02-12T19:31:06.549095687Z" level=info msg="StopPodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" returns successfully" Feb 12 19:31:06.552386 env[1141]: time="2024-02-12T19:31:06.551998268Z" level=info msg="RemovePodSandbox for \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\"" Feb 12 19:31:06.552386 env[1141]: time="2024-02-12T19:31:06.552034589Z" level=info msg="Forcibly stopping sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\"" Feb 12 19:31:06.564254 sshd[4335]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:06.564000 audit[4335]: USER_END pid=4335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.564000 audit[4335]: CRED_DISP pid=4335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.568880 systemd[1]: sshd@14-10.0.0.116:22-10.0.0.1:37912.service: Deactivated successfully. Feb 12 19:31:06.569776 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:31:06.572351 kernel: audit: type=1106 audit(1707766266.564:1380): pid=4335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.572419 kernel: audit: type=1104 audit(1707766266.564:1381): pid=4335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:06.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.116:22-10.0.0.1:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:06.570500 systemd-logind[1125]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:31:06.573324 systemd-logind[1125]: Removed session 15. Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.597 [WARNING][4405] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0", GenerateName:"calico-kube-controllers-75689bd899-", Namespace:"calico-system", SelfLink:"", UID:"c9935352-f103-4b61-876e-54da2abe1d04", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75689bd899", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3d5a638fed8374db5383386f268410415f15cd62604806e2e323b4afe9b941da", Pod:"calico-kube-controllers-75689bd899-lmj4f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8cd01479d6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.597 [INFO][4405] k8s.go 578: Cleaning up netns ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.597 [INFO][4405] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" iface="eth0" netns="" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.597 [INFO][4405] k8s.go 585: Releasing IP address(es) ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.597 [INFO][4405] utils.go 188: Calico CNI releasing IP address ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.632 [INFO][4413] ipam_plugin.go 415: Releasing address using handleID ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.633 [INFO][4413] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.633 [INFO][4413] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.646 [WARNING][4413] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.646 [INFO][4413] ipam_plugin.go 443: Releasing address using workloadID ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" HandleID="k8s-pod-network.579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Workload="localhost-k8s-calico--kube--controllers--75689bd899--lmj4f-eth0" Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.647 [INFO][4413] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.651303 env[1141]: 2024-02-12 19:31:06.649 [INFO][4405] k8s.go 591: Teardown processing complete. ContainerID="579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b" Feb 12 19:31:06.651303 env[1141]: time="2024-02-12T19:31:06.651071071Z" level=info msg="TearDown network for sandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" successfully" Feb 12 19:31:06.653885 env[1141]: time="2024-02-12T19:31:06.653829489Z" level=info msg="RemovePodSandbox \"579943dc33946f9aac9270de878f556a611fd2ac7b2d296c14181648970e7f1b\" returns successfully" Feb 12 19:31:06.654367 env[1141]: time="2024-02-12T19:31:06.654339900Z" level=info msg="StopPodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\"" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.693 [WARNING][4436] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--5k7dh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ac8a30-2ae8-4125-ace8-535d21d0b8d3", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc", Pod:"coredns-5d78c9869d-5k7dh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali60beeb05184", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.694 [INFO][4436] k8s.go 578: Cleaning up netns ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.694 [INFO][4436] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" iface="eth0" netns="" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.694 [INFO][4436] k8s.go 585: Releasing IP address(es) ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.694 [INFO][4436] utils.go 188: Calico CNI releasing IP address ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.711 [INFO][4443] ipam_plugin.go 415: Releasing address using handleID ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.711 [INFO][4443] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.711 [INFO][4443] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.725 [WARNING][4443] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.725 [INFO][4443] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.727 [INFO][4443] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.731891 env[1141]: 2024-02-12 19:31:06.729 [INFO][4436] k8s.go 591: Teardown processing complete. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.731891 env[1141]: time="2024-02-12T19:31:06.731764408Z" level=info msg="TearDown network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" successfully" Feb 12 19:31:06.731891 env[1141]: time="2024-02-12T19:31:06.731796649Z" level=info msg="StopPodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" returns successfully" Feb 12 19:31:06.732666 env[1141]: time="2024-02-12T19:31:06.732633826Z" level=info msg="RemovePodSandbox for \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\"" Feb 12 19:31:06.732923 env[1141]: time="2024-02-12T19:31:06.732863871Z" level=info msg="Forcibly stopping sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\"" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.777 [WARNING][4467] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--5k7dh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ac8a30-2ae8-4125-ace8-535d21d0b8d3", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 30, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eec1c97d54b9c0b81970fa64bb12435a4c55cf99774c46e37633cf9fe46f2adc", Pod:"coredns-5d78c9869d-5k7dh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali60beeb05184", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.778 [INFO][4467] k8s.go 578: Cleaning up netns ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.778 [INFO][4467] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" iface="eth0" netns="" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.778 [INFO][4467] k8s.go 585: Releasing IP address(es) ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.778 [INFO][4467] utils.go 188: Calico CNI releasing IP address ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.801 [INFO][4475] ipam_plugin.go 415: Releasing address using handleID ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.801 [INFO][4475] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.801 [INFO][4475] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.815 [WARNING][4475] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.815 [INFO][4475] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" HandleID="k8s-pod-network.c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Workload="localhost-k8s-coredns--5d78c9869d--5k7dh-eth0" Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.819 [INFO][4475] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:31:06.827527 env[1141]: 2024-02-12 19:31:06.824 [INFO][4467] k8s.go 591: Teardown processing complete. ContainerID="c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71" Feb 12 19:31:06.828117 env[1141]: time="2024-02-12T19:31:06.827547462Z" level=info msg="TearDown network for sandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" successfully" Feb 12 19:31:06.830149 env[1141]: time="2024-02-12T19:31:06.830107236Z" level=info msg="RemovePodSandbox \"c47473722ff2b257fda275c165eef3d279d4dd699c601476ca4e018fd1be5b71\" returns successfully" Feb 12 19:31:07.768298 env[1141]: time="2024-02-12T19:31:07.768237465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.770484 env[1141]: time="2024-02-12T19:31:07.770432910Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.775232 env[1141]: time="2024-02-12T19:31:07.775194209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.778472 env[1141]: time="2024-02-12T19:31:07.778435117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:31:07.779328 env[1141]: time="2024-02-12T19:31:07.779290055Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:31:07.783075 env[1141]: time="2024-02-12T19:31:07.783034692Z" level=info msg="CreateContainer within sandbox \"672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:31:07.794200 env[1141]: time="2024-02-12T19:31:07.794135523Z" level=info msg="CreateContainer within sandbox \"672f236d10463b57af8d24170f3c085b79eb3623f65e9bde084d517511006894\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"32b7d5e1a897aa4750c44ce31bc320745d7d8c76b2a225a268700707610523e4\"" Feb 12 19:31:07.796782 env[1141]: time="2024-02-12T19:31:07.796751178Z" level=info msg="StartContainer for \"32b7d5e1a897aa4750c44ce31bc320745d7d8c76b2a225a268700707610523e4\"" Feb 12 19:31:07.850634 systemd[1]: Started cri-containerd-32b7d5e1a897aa4750c44ce31bc320745d7d8c76b2a225a268700707610523e4.scope. Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit: BPF prog-id=189 op=LOAD Feb 12 19:31:07.900000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4173 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623764356531613839376161343735306334346365333162633332 Feb 12 19:31:07.900000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.900000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4173 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623764356531613839376161343735306334346365333162633332 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit: BPF prog-id=190 op=LOAD Feb 12 19:31:07.901000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4173 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623764356531613839376161343735306334346365333162633332 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit: BPF prog-id=191 op=LOAD Feb 12 19:31:07.901000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4173 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623764356531613839376161343735306334346365333162633332 Feb 12 19:31:07.901000 audit: BPF prog-id=191 op=UNLOAD Feb 12 19:31:07.901000 audit: BPF prog-id=190 op=UNLOAD Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { perfmon } for pid=4490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit[4490]: AVC avc: denied { bpf } for pid=4490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:31:07.901000 audit: BPF prog-id=192 op=LOAD Feb 12 19:31:07.901000 audit[4490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4173 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:07.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332623764356531613839376161343735306334346365333162633332 Feb 12 19:31:07.924872 env[1141]: time="2024-02-12T19:31:07.924811761Z" level=info msg="StartContainer for \"32b7d5e1a897aa4750c44ce31bc320745d7d8c76b2a225a268700707610523e4\" returns successfully" Feb 12 19:31:08.290426 kubelet[2002]: I0212 19:31:08.290389 2002 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6947dd49d9-ljchv" podStartSLOduration=1.809817265 podCreationTimestamp="2024-02-12 19:31:04 +0000 UTC" firstStartedPulling="2024-02-12 19:31:05.299134348 +0000 UTC m=+59.316190890" lastFinishedPulling="2024-02-12 19:31:07.779669422 +0000 UTC m=+61.796725964" observedRunningTime="2024-02-12 19:31:08.290258657 +0000 UTC m=+62.307315199" watchObservedRunningTime="2024-02-12 19:31:08.290352339 +0000 UTC m=+62.307408881" Feb 12 19:31:08.300000 audit[4523]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.300000 audit[4523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffeadbcc10 a2=0 a3=ffff93ae16c0 items=0 ppid=2151 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.300000 audit[4523]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.300000 audit[4523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffeadbcc10 a2=0 a3=ffff93ae16c0 items=0 ppid=2151 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.519000 audit[4501]: AVC avc: denied { watch } for pid=4501 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_31_04.1042910347/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c83,c146 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c83,c146 tclass=file permissive=0 Feb 12 19:31:08.519000 audit[4501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000be64e0 a2=fc6 a3=0 items=0 ppid=4173 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c83,c146 key=(null) Feb 12 19:31:08.519000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:31:08.679000 audit[4525]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.679000 audit[4525]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcfd678e0 a2=0 a3=ffffa2eec6c0 items=0 ppid=2151 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.680000 audit[4525]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:08.680000 audit[4525]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcfd678e0 a2=0 a3=ffffa2eec6c0 items=0 ppid=2151 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:08.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:08.790463 systemd[1]: run-containerd-runc-k8s.io-32b7d5e1a897aa4750c44ce31bc320745d7d8c76b2a225a268700707610523e4-runc.PvAXvA.mount: Deactivated successfully. Feb 12 19:31:11.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.116:22-10.0.0.1:37918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:11.568587 systemd[1]: Started sshd@15-10.0.0.116:22-10.0.0.1:37918.service. Feb 12 19:31:11.574420 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 12 19:31:11.574539 kernel: audit: type=1130 audit(1707766271.567:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.116:22-10.0.0.1:37918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:11.622000 audit[4529]: USER_ACCT pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.623336 sshd[4529]: Accepted publickey for core from 10.0.0.1 port 37918 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:11.624755 sshd[4529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:11.623000 audit[4529]: CRED_ACQ pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.632054 kernel: audit: type=1101 audit(1707766271.622:1407): pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.633208 kernel: audit: type=1103 audit(1707766271.623:1408): pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.639899 kernel: audit: type=1006 audit(1707766271.623:1409): pid=4529 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:31:11.640034 kernel: audit: type=1300 audit(1707766271.623:1409): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeda143c0 a2=3 a3=1 items=0 ppid=1 pid=4529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.640067 kernel: audit: type=1327 audit(1707766271.623:1409): proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:11.623000 audit[4529]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeda143c0 a2=3 a3=1 items=0 ppid=1 pid=4529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:11.638797 systemd-logind[1125]: New session 16 of user core. Feb 12 19:31:11.639489 systemd[1]: Started session-16.scope. Feb 12 19:31:11.643000 audit[4529]: USER_START pid=4529 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.649433 kernel: audit: type=1105 audit(1707766271.643:1410): pid=4529 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.649530 kernel: audit: type=1103 audit(1707766271.647:1411): pid=4531 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.647000 audit[4531]: CRED_ACQ pid=4531 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.776979 sshd[4529]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:11.777000 audit[4529]: USER_END pid=4529 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.777000 audit[4529]: CRED_DISP pid=4529 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.783724 systemd[1]: sshd@15-10.0.0.116:22-10.0.0.1:37918.service: Deactivated successfully. Feb 12 19:31:11.784451 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:31:11.785108 systemd-logind[1125]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:31:11.786337 systemd[1]: Started sshd@16-10.0.0.116:22-10.0.0.1:37920.service. Feb 12 19:31:11.788138 kernel: audit: type=1106 audit(1707766271.777:1412): pid=4529 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.788228 kernel: audit: type=1104 audit(1707766271.777:1413): pid=4529 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.788251 systemd-logind[1125]: Removed session 16. Feb 12 19:31:11.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.116:22-10.0.0.1:37918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:11.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.116:22-10.0.0.1:37920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:11.829000 audit[4542]: USER_ACCT pid=4542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.831156 sshd[4542]: Accepted publickey for core from 10.0.0.1 port 37920 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:11.831000 audit[4542]: CRED_ACQ pid=4542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.831000 audit[4542]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1274f70 a2=3 a3=1 items=0 ppid=1 pid=4542 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:11.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:11.832931 sshd[4542]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:11.837275 systemd-logind[1125]: New session 17 of user core. Feb 12 19:31:11.837817 systemd[1]: Started session-17.scope. Feb 12 19:31:11.841000 audit[4542]: USER_START pid=4542 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:11.843000 audit[4545]: CRED_ACQ pid=4545 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:12.119080 sshd[4542]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:12.120000 audit[4542]: USER_END pid=4542 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:12.120000 audit[4542]: CRED_DISP pid=4542 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:12.124162 systemd[1]: Started sshd@17-10.0.0.116:22-10.0.0.1:37924.service. Feb 12 19:31:12.124690 systemd[1]: sshd@16-10.0.0.116:22-10.0.0.1:37920.service: Deactivated successfully. Feb 12 19:31:12.125500 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:31:12.126327 systemd-logind[1125]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:31:12.127216 systemd-logind[1125]: Removed session 17. Feb 12 19:31:12.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.116:22-10.0.0.1:37924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:12.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.116:22-10.0.0.1:37920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:12.182000 audit[4554]: USER_ACCT pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:12.183468 sshd[4554]: Accepted publickey for core from 10.0.0.1 port 37924 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:12.184000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:12.184000 audit[4554]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd06bc4f0 a2=3 a3=1 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:12.184000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:12.185388 sshd[4554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:12.189462 systemd-logind[1125]: New session 18 of user core. Feb 12 19:31:12.190341 systemd[1]: Started session-18.scope. Feb 12 19:31:12.195000 audit[4554]: USER_START pid=4554 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:12.197000 audit[4557]: CRED_ACQ pid=4557 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.142000 audit[4569]: NETFILTER_CFG table=filter:122 family=2 entries=22 op=nft_register_rule pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.142000 audit[4569]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffd7f8a850 a2=0 a3=ffff8623b6c0 items=0 ppid=2151 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.142000 audit[4569]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.142000 audit[4569]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd7f8a850 a2=0 a3=ffff8623b6c0 items=0 ppid=2151 pid=4569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.155439 sshd[4554]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:13.159000 audit[4554]: USER_END pid=4554 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.159000 audit[4554]: CRED_DISP pid=4554 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.161128 systemd[1]: Started sshd@18-10.0.0.116:22-10.0.0.1:46096.service. Feb 12 19:31:13.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.116:22-10.0.0.1:46096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:13.165716 systemd[1]: sshd@17-10.0.0.116:22-10.0.0.1:37924.service: Deactivated successfully. Feb 12 19:31:13.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.116:22-10.0.0.1:37924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:13.167081 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:31:13.169353 systemd-logind[1125]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:31:13.170154 systemd-logind[1125]: Removed session 18. Feb 12 19:31:13.172000 audit[4574]: NETFILTER_CFG table=filter:124 family=2 entries=34 op=nft_register_rule pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.172000 audit[4574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffd96e9d90 a2=0 a3=ffffa73f06c0 items=0 ppid=2151 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.173000 audit[4574]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:13.173000 audit[4574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd96e9d90 a2=0 a3=ffffa73f06c0 items=0 ppid=2151 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:13.207000 audit[4572]: USER_ACCT pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.208366 sshd[4572]: Accepted publickey for core from 10.0.0.1 port 46096 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:13.208000 audit[4572]: CRED_ACQ pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.208000 audit[4572]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4686f20 a2=3 a3=1 items=0 ppid=1 pid=4572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:13.209830 sshd[4572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:13.213924 systemd-logind[1125]: New session 19 of user core. Feb 12 19:31:13.214133 systemd[1]: Started session-19.scope. Feb 12 19:31:13.216000 audit[4572]: USER_START pid=4572 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.217000 audit[4576]: CRED_ACQ pid=4576 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.568560 sshd[4572]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:13.568000 audit[4572]: USER_END pid=4572 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.568000 audit[4572]: CRED_DISP pid=4572 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.572470 systemd[1]: sshd@18-10.0.0.116:22-10.0.0.1:46096.service: Deactivated successfully. Feb 12 19:31:13.573330 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:31:13.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.116:22-10.0.0.1:46096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:13.573982 systemd-logind[1125]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:31:13.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.116:22-10.0.0.1:46104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:13.575453 systemd[1]: Started sshd@19-10.0.0.116:22-10.0.0.1:46104.service. Feb 12 19:31:13.580102 systemd-logind[1125]: Removed session 19. Feb 12 19:31:13.623000 audit[4585]: USER_ACCT pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.624301 sshd[4585]: Accepted publickey for core from 10.0.0.1 port 46104 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:13.624000 audit[4585]: CRED_ACQ pid=4585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.624000 audit[4585]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8ba1930 a2=3 a3=1 items=0 ppid=1 pid=4585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:13.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:13.625750 sshd[4585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:13.630372 systemd-logind[1125]: New session 20 of user core. Feb 12 19:31:13.631362 systemd[1]: Started session-20.scope. Feb 12 19:31:13.634000 audit[4585]: USER_START pid=4585 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.635000 audit[4587]: CRED_ACQ pid=4587 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.739198 sshd[4585]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:13.739000 audit[4585]: USER_END pid=4585 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.739000 audit[4585]: CRED_DISP pid=4585 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:13.742001 systemd[1]: sshd@19-10.0.0.116:22-10.0.0.1:46104.service: Deactivated successfully. Feb 12 19:31:13.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.116:22-10.0.0.1:46104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:13.742780 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:31:13.743340 systemd-logind[1125]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:31:13.744077 systemd-logind[1125]: Removed session 20. Feb 12 19:31:18.509000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.510937 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:31:18.511010 kernel: audit: type=1400 audit(1707766278.509:1455): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.509000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eb5920 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.516677 kernel: audit: type=1300 audit(1707766278.509:1455): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eb5920 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.516738 kernel: audit: type=1327 audit(1707766278.509:1455): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.509000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.521835 kernel: audit: type=1400 audit(1707766278.509:1456): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.521904 kernel: audit: type=1300 audit(1707766278.509:1456): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eb5940 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.509000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eb5940 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.527494 kernel: audit: type=1327 audit(1707766278.509:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.527578 kernel: audit: type=1400 audit(1707766278.511:1457): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.511000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.529913 kernel: audit: type=1300 audit(1707766278.511:1457): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb0660 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.511000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb0660 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.536288 kernel: audit: type=1327 audit(1707766278.511:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.536541 kernel: audit: type=1400 audit(1707766278.511:1458): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.511000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:31:18.511000 audit[1882]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eb5a60 a2=fc6 a3=0 items=0 ppid=1726 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c38,c54 key=(null) Feb 12 19:31:18.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:31:18.701000 audit[4602]: NETFILTER_CFG table=filter:126 family=2 entries=22 op=nft_register_rule pid=4602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:18.701000 audit[4602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd012fef0 a2=0 a3=ffffb96396c0 items=0 ppid=2151 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:18.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:18.703000 audit[4602]: NETFILTER_CFG table=nat:127 family=2 entries=104 op=nft_register_chain pid=4602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:18.703000 audit[4602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffd012fef0 a2=0 a3=ffffb96396c0 items=0 ppid=2151 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:18.703000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:18.744569 systemd[1]: Started sshd@20-10.0.0.116:22-10.0.0.1:46120.service. Feb 12 19:31:18.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.116:22-10.0.0.1:46120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:18.786000 audit[4605]: USER_ACCT pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:18.787775 sshd[4605]: Accepted publickey for core from 10.0.0.1 port 46120 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:18.788000 audit[4605]: CRED_ACQ pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:18.788000 audit[4605]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde342170 a2=3 a3=1 items=0 ppid=1 pid=4605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:18.788000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:18.789578 sshd[4605]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:18.793778 systemd-logind[1125]: New session 21 of user core. Feb 12 19:31:18.794612 systemd[1]: Started session-21.scope. Feb 12 19:31:18.797000 audit[4605]: USER_START pid=4605 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:18.798000 audit[4607]: CRED_ACQ pid=4607 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:18.902962 sshd[4605]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:18.903000 audit[4605]: USER_END pid=4605 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:18.903000 audit[4605]: CRED_DISP pid=4605 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:18.905795 systemd-logind[1125]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:31:18.906089 systemd[1]: sshd@20-10.0.0.116:22-10.0.0.1:46120.service: Deactivated successfully. Feb 12 19:31:18.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.116:22-10.0.0.1:46120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:18.906877 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:31:18.907496 systemd-logind[1125]: Removed session 21. Feb 12 19:31:19.346000 audit[4619]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=4619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:19.346000 audit[4619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffffcf85500 a2=0 a3=ffffb76ac6c0 items=0 ppid=2151 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:19.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:19.347000 audit[4619]: NETFILTER_CFG table=nat:129 family=2 entries=51 op=nft_register_chain pid=4619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:19.347000 audit[4619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17716 a0=3 a1=fffffcf85500 a2=0 a3=ffffb76ac6c0 items=0 ppid=2151 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:19.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:23.907733 systemd[1]: Started sshd@21-10.0.0.116:22-10.0.0.1:32830.service. Feb 12 19:31:23.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.116:22-10.0.0.1:32830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.911487 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:31:23.911556 kernel: audit: type=1130 audit(1707766283.907:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.116:22-10.0.0.1:32830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:23.949000 audit[4652]: USER_ACCT pid=4652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.950418 sshd[4652]: Accepted publickey for core from 10.0.0.1 port 32830 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:23.952891 kernel: audit: type=1101 audit(1707766283.949:1473): pid=4652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.952000 audit[4652]: CRED_ACQ pid=4652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.953982 sshd[4652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:23.955875 kernel: audit: type=1103 audit(1707766283.952:1474): pid=4652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.955913 kernel: audit: type=1006 audit(1707766283.952:1475): pid=4652 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 19:31:23.952000 audit[4652]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff13a4080 a2=3 a3=1 items=0 ppid=1 pid=4652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:23.959815 kernel: audit: type=1300 audit(1707766283.952:1475): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff13a4080 a2=3 a3=1 items=0 ppid=1 pid=4652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:23.959902 kernel: audit: type=1327 audit(1707766283.952:1475): proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:23.952000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:23.960473 systemd-logind[1125]: New session 22 of user core. Feb 12 19:31:23.960852 systemd[1]: Started session-22.scope. Feb 12 19:31:23.964000 audit[4652]: USER_START pid=4652 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.965000 audit[4654]: CRED_ACQ pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.969755 kernel: audit: type=1105 audit(1707766283.964:1476): pid=4652 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:23.969801 kernel: audit: type=1103 audit(1707766283.965:1477): pid=4654 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:24.076165 sshd[4652]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:24.076000 audit[4652]: USER_END pid=4652 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:24.078581 systemd[1]: sshd@21-10.0.0.116:22-10.0.0.1:32830.service: Deactivated successfully. Feb 12 19:31:24.079464 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:31:24.076000 audit[4652]: CRED_DISP pid=4652 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:24.080072 systemd-logind[1125]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:31:24.081017 systemd-logind[1125]: Removed session 22. Feb 12 19:31:24.082150 kernel: audit: type=1106 audit(1707766284.076:1478): pid=4652 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:24.082211 kernel: audit: type=1104 audit(1707766284.076:1479): pid=4652 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:24.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.116:22-10.0.0.1:32830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:29.083107 systemd[1]: Started sshd@22-10.0.0.116:22-10.0.0.1:32838.service. Feb 12 19:31:29.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.116:22-10.0.0.1:32838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:29.084094 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:31:29.084159 kernel: audit: type=1130 audit(1707766289.082:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.116:22-10.0.0.1:32838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:29.127000 audit[4668]: USER_ACCT pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.129728 sshd[4668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:29.130710 sshd[4668]: Accepted publickey for core from 10.0.0.1 port 32838 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:29.128000 audit[4668]: CRED_ACQ pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.133047 kernel: audit: type=1101 audit(1707766289.127:1482): pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.133115 kernel: audit: type=1103 audit(1707766289.128:1483): pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.133141 kernel: audit: type=1006 audit(1707766289.128:1484): pid=4668 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 19:31:29.128000 audit[4668]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1422910 a2=3 a3=1 items=0 ppid=1 pid=4668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:29.138080 kernel: audit: type=1300 audit(1707766289.128:1484): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1422910 a2=3 a3=1 items=0 ppid=1 pid=4668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:29.138245 kernel: audit: type=1327 audit(1707766289.128:1484): proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:29.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:29.141508 systemd[1]: Started session-23.scope. Feb 12 19:31:29.141882 systemd-logind[1125]: New session 23 of user core. Feb 12 19:31:29.146000 audit[4668]: USER_START pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.150944 kernel: audit: type=1105 audit(1707766289.146:1485): pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.150000 audit[4670]: CRED_ACQ pid=4670 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.153879 kernel: audit: type=1103 audit(1707766289.150:1486): pid=4670 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.284556 sshd[4668]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:29.285000 audit[4668]: USER_END pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.290700 systemd[1]: sshd@22-10.0.0.116:22-10.0.0.1:32838.service: Deactivated successfully. Feb 12 19:31:29.291570 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:31:29.286000 audit[4668]: CRED_DISP pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.292269 systemd-logind[1125]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:31:29.294803 kernel: audit: type=1106 audit(1707766289.285:1487): pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.294955 kernel: audit: type=1104 audit(1707766289.286:1488): pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:29.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.116:22-10.0.0.1:32838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:29.295667 systemd-logind[1125]: Removed session 23. Feb 12 19:31:34.288381 systemd[1]: Started sshd@23-10.0.0.116:22-10.0.0.1:39576.service. Feb 12 19:31:34.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.116:22-10.0.0.1:39576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:34.299348 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:31:34.299470 kernel: audit: type=1130 audit(1707766294.287:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.116:22-10.0.0.1:39576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:34.334000 audit[4681]: USER_ACCT pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.336245 sshd[4681]: Accepted publickey for core from 10.0.0.1 port 39576 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:31:34.336000 audit[4681]: CRED_ACQ pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.337262 sshd[4681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:31:34.342697 systemd-logind[1125]: New session 24 of user core. Feb 12 19:31:34.345934 kernel: audit: type=1101 audit(1707766294.334:1491): pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.346018 kernel: audit: type=1103 audit(1707766294.336:1492): pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.346041 kernel: audit: type=1006 audit(1707766294.336:1493): pid=4681 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:31:34.346081 kernel: audit: type=1300 audit(1707766294.336:1493): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecaa32c0 a2=3 a3=1 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:34.336000 audit[4681]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecaa32c0 a2=3 a3=1 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:34.343570 systemd[1]: Started session-24.scope. Feb 12 19:31:34.336000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:34.352731 kernel: audit: type=1327 audit(1707766294.336:1493): proctitle=737368643A20636F7265205B707269765D Feb 12 19:31:34.353000 audit[4681]: USER_START pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.355000 audit[4683]: CRED_ACQ pid=4683 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.359661 kernel: audit: type=1105 audit(1707766294.353:1494): pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.359759 kernel: audit: type=1103 audit(1707766294.355:1495): pid=4683 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.504215 sshd[4681]: pam_unix(sshd:session): session closed for user core Feb 12 19:31:34.504000 audit[4681]: USER_END pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.506929 systemd[1]: sshd@23-10.0.0.116:22-10.0.0.1:39576.service: Deactivated successfully. Feb 12 19:31:34.507882 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:31:34.504000 audit[4681]: CRED_DISP pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.509207 systemd-logind[1125]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:31:34.509985 systemd-logind[1125]: Removed session 24. Feb 12 19:31:34.510652 kernel: audit: type=1106 audit(1707766294.504:1496): pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.510724 kernel: audit: type=1104 audit(1707766294.504:1497): pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:31:34.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.116:22-10.0.0.1:39576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:31:35.164000 audit[4715]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:35.164000 audit[4715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffff2b0e20 a2=0 a3=ffffb3c296c0 items=0 ppid=2151 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:35.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:31:35.165000 audit[4715]: NETFILTER_CFG table=nat:131 family=2 entries=58 op=nft_register_chain pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:31:35.165000 audit[4715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19604 a0=3 a1=ffffff2b0e20 a2=0 a3=ffffb3c296c0 items=0 ppid=2151 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:31:35.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273