Feb 12 19:23:06.738842 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:23:06.738861 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:23:06.738869 kernel: efi: EFI v2.70 by EDK II Feb 12 19:23:06.738875 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 12 19:23:06.738880 kernel: random: crng init done Feb 12 19:23:06.738886 kernel: ACPI: Early table checksum verification disabled Feb 12 19:23:06.738892 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 12 19:23:06.738899 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:23:06.738905 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738910 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738916 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738932 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738938 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738943 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738952 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738958 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738964 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:23:06.738970 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 12 19:23:06.738976 kernel: NUMA: Failed to initialise from firmware Feb 12 19:23:06.738982 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:23:06.738988 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Feb 12 19:23:06.738993 kernel: Zone ranges: Feb 12 19:23:06.738999 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:23:06.739006 kernel: DMA32 empty Feb 12 19:23:06.739012 kernel: Normal empty Feb 12 19:23:06.739018 kernel: Movable zone start for each node Feb 12 19:23:06.739024 kernel: Early memory node ranges Feb 12 19:23:06.739029 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 12 19:23:06.739035 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 12 19:23:06.739041 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 12 19:23:06.739047 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 12 19:23:06.739053 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 12 19:23:06.739059 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 12 19:23:06.739066 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 12 19:23:06.739072 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:23:06.739079 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 12 19:23:06.739085 kernel: psci: probing for conduit method from ACPI. Feb 12 19:23:06.739091 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:23:06.739097 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:23:06.739103 kernel: psci: Trusted OS migration not required Feb 12 19:23:06.739112 kernel: psci: SMC Calling Convention v1.1 Feb 12 19:23:06.739118 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 12 19:23:06.739126 kernel: ACPI: SRAT not present Feb 12 19:23:06.739132 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:23:06.739139 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:23:06.739145 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 12 19:23:06.739152 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:23:06.739158 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:23:06.739164 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:23:06.739170 kernel: CPU features: detected: Spectre-v4 Feb 12 19:23:06.739177 kernel: CPU features: detected: Spectre-BHB Feb 12 19:23:06.739184 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:23:06.739191 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:23:06.739197 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:23:06.739203 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 12 19:23:06.739209 kernel: Policy zone: DMA Feb 12 19:23:06.739217 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:23:06.739223 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:23:06.739230 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:23:06.739236 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:23:06.739242 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:23:06.739249 kernel: Memory: 2459152K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113136K reserved, 0K cma-reserved) Feb 12 19:23:06.739256 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:23:06.739262 kernel: trace event string verifier disabled Feb 12 19:23:06.739269 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:23:06.739275 kernel: rcu: RCU event tracing is enabled. Feb 12 19:23:06.739282 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:23:06.739289 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:23:06.739295 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:23:06.739301 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:23:06.739308 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:23:06.739314 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:23:06.739320 kernel: GICv3: 256 SPIs implemented Feb 12 19:23:06.739328 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:23:06.739334 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:23:06.739340 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:23:06.739346 kernel: GICv3: 16 PPIs implemented Feb 12 19:23:06.739352 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 12 19:23:06.739358 kernel: ACPI: SRAT not present Feb 12 19:23:06.739364 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 12 19:23:06.739371 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 12 19:23:06.739377 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 12 19:23:06.739384 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 12 19:23:06.739390 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 12 19:23:06.739396 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:23:06.739403 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:23:06.739410 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:23:06.739416 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:23:06.739422 kernel: arm-pv: using stolen time PV Feb 12 19:23:06.739429 kernel: Console: colour dummy device 80x25 Feb 12 19:23:06.739435 kernel: ACPI: Core revision 20210730 Feb 12 19:23:06.739442 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:23:06.739448 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:23:06.739455 kernel: LSM: Security Framework initializing Feb 12 19:23:06.739461 kernel: SELinux: Initializing. Feb 12 19:23:06.739468 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:23:06.739475 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:23:06.739481 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:23:06.739488 kernel: Platform MSI: ITS@0x8080000 domain created Feb 12 19:23:06.739494 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 12 19:23:06.739501 kernel: Remapping and enabling EFI services. Feb 12 19:23:06.739507 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:23:06.739513 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:23:06.739520 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 12 19:23:06.739528 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 12 19:23:06.739534 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:23:06.739541 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:23:06.739547 kernel: Detected PIPT I-cache on CPU2 Feb 12 19:23:06.739554 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 12 19:23:06.739560 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 12 19:23:06.739567 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:23:06.739573 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 12 19:23:06.739580 kernel: Detected PIPT I-cache on CPU3 Feb 12 19:23:06.739586 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 12 19:23:06.739594 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 12 19:23:06.739600 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:23:06.739607 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 12 19:23:06.739613 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:23:06.739624 kernel: SMP: Total of 4 processors activated. Feb 12 19:23:06.739632 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:23:06.739639 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:23:06.739646 kernel: CPU features: detected: Common not Private translations Feb 12 19:23:06.739652 kernel: CPU features: detected: CRC32 instructions Feb 12 19:23:06.739659 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:23:06.739666 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:23:06.739672 kernel: CPU features: detected: Privileged Access Never Feb 12 19:23:06.739680 kernel: CPU features: detected: RAS Extension Support Feb 12 19:23:06.739687 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 12 19:23:06.739694 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:23:06.739700 kernel: alternatives: patching kernel code Feb 12 19:23:06.739708 kernel: devtmpfs: initialized Feb 12 19:23:06.739715 kernel: KASLR enabled Feb 12 19:23:06.739722 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:23:06.739729 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:23:06.739735 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:23:06.739742 kernel: SMBIOS 3.0.0 present. Feb 12 19:23:06.739749 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 12 19:23:06.739763 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:23:06.739770 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:23:06.739777 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:23:06.739786 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:23:06.739793 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:23:06.739800 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 Feb 12 19:23:06.739807 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:23:06.739813 kernel: cpuidle: using governor menu Feb 12 19:23:06.739820 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:23:06.739827 kernel: ASID allocator initialised with 32768 entries Feb 12 19:23:06.739834 kernel: ACPI: bus type PCI registered Feb 12 19:23:06.739841 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:23:06.739849 kernel: Serial: AMBA PL011 UART driver Feb 12 19:23:06.739855 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:23:06.739862 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:23:06.739869 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:23:06.739876 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:23:06.739882 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:23:06.739889 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:23:06.739896 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:23:06.739902 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:23:06.739911 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:23:06.739922 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:23:06.739930 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:23:06.739936 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:23:06.739943 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:23:06.739950 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:23:06.739957 kernel: ACPI: Interpreter enabled Feb 12 19:23:06.739963 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:23:06.739970 kernel: ACPI: MCFG table detected, 1 entries Feb 12 19:23:06.739978 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:23:06.739985 kernel: printk: console [ttyAMA0] enabled Feb 12 19:23:06.739992 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:23:06.740726 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:23:06.740816 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 12 19:23:06.740879 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 12 19:23:06.740961 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 12 19:23:06.741026 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 12 19:23:06.741035 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 12 19:23:06.741043 kernel: PCI host bridge to bus 0000:00 Feb 12 19:23:06.741108 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 12 19:23:06.741165 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 12 19:23:06.741219 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 12 19:23:06.741272 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:23:06.741346 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 12 19:23:06.741434 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:23:06.741499 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 12 19:23:06.741567 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 12 19:23:06.741634 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:23:06.741695 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:23:06.741766 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 12 19:23:06.741836 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 12 19:23:06.741895 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 12 19:23:06.741959 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 12 19:23:06.742016 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 12 19:23:06.742026 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 12 19:23:06.742033 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 12 19:23:06.742039 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 12 19:23:06.742049 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 12 19:23:06.742056 kernel: iommu: Default domain type: Translated Feb 12 19:23:06.742063 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:23:06.742070 kernel: vgaarb: loaded Feb 12 19:23:06.742076 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:23:06.742083 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:23:06.742090 kernel: PTP clock support registered Feb 12 19:23:06.742096 kernel: Registered efivars operations Feb 12 19:23:06.742103 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:23:06.742112 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:23:06.742119 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:23:06.742126 kernel: pnp: PnP ACPI init Feb 12 19:23:06.742194 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 12 19:23:06.742204 kernel: pnp: PnP ACPI: found 1 devices Feb 12 19:23:06.742211 kernel: NET: Registered PF_INET protocol family Feb 12 19:23:06.742218 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:23:06.742225 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:23:06.742231 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:23:06.742240 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:23:06.742247 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:23:06.742254 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:23:06.742261 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:23:06.742268 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:23:06.742275 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:23:06.742282 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:23:06.742294 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 12 19:23:06.742303 kernel: kvm [1]: HYP mode not available Feb 12 19:23:06.742309 kernel: Initialise system trusted keyrings Feb 12 19:23:06.742316 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:23:06.742323 kernel: Key type asymmetric registered Feb 12 19:23:06.742330 kernel: Asymmetric key parser 'x509' registered Feb 12 19:23:06.742339 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:23:06.742346 kernel: io scheduler mq-deadline registered Feb 12 19:23:06.742353 kernel: io scheduler kyber registered Feb 12 19:23:06.742360 kernel: io scheduler bfq registered Feb 12 19:23:06.742367 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 12 19:23:06.742376 kernel: ACPI: button: Power Button [PWRB] Feb 12 19:23:06.742383 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 12 19:23:06.742448 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 12 19:23:06.742458 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:23:06.742465 kernel: thunder_xcv, ver 1.0 Feb 12 19:23:06.742472 kernel: thunder_bgx, ver 1.0 Feb 12 19:23:06.742478 kernel: nicpf, ver 1.0 Feb 12 19:23:06.742485 kernel: nicvf, ver 1.0 Feb 12 19:23:06.742560 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:23:06.742620 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:23:06 UTC (1707765786) Feb 12 19:23:06.742629 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:23:06.742636 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:23:06.742642 kernel: Segment Routing with IPv6 Feb 12 19:23:06.742649 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:23:06.742656 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:23:06.742662 kernel: Key type dns_resolver registered Feb 12 19:23:06.742669 kernel: registered taskstats version 1 Feb 12 19:23:06.742677 kernel: Loading compiled-in X.509 certificates Feb 12 19:23:06.742684 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:23:06.742691 kernel: Key type .fscrypt registered Feb 12 19:23:06.742698 kernel: Key type fscrypt-provisioning registered Feb 12 19:23:06.742704 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:23:06.742711 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:23:06.742718 kernel: ima: No architecture policies found Feb 12 19:23:06.742724 kernel: Freeing unused kernel memory: 34688K Feb 12 19:23:06.742732 kernel: Run /init as init process Feb 12 19:23:06.742739 kernel: with arguments: Feb 12 19:23:06.742745 kernel: /init Feb 12 19:23:06.742760 kernel: with environment: Feb 12 19:23:06.742766 kernel: HOME=/ Feb 12 19:23:06.742773 kernel: TERM=linux Feb 12 19:23:06.742779 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:23:06.742788 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:23:06.742797 systemd[1]: Detected virtualization kvm. Feb 12 19:23:06.742806 systemd[1]: Detected architecture arm64. Feb 12 19:23:06.742813 systemd[1]: Running in initrd. Feb 12 19:23:06.742820 systemd[1]: No hostname configured, using default hostname. Feb 12 19:23:06.742827 systemd[1]: Hostname set to . Feb 12 19:23:06.742834 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:23:06.742841 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:23:06.742849 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:23:06.742856 systemd[1]: Reached target cryptsetup.target. Feb 12 19:23:06.742864 systemd[1]: Reached target paths.target. Feb 12 19:23:06.742871 systemd[1]: Reached target slices.target. Feb 12 19:23:06.742879 systemd[1]: Reached target swap.target. Feb 12 19:23:06.742886 systemd[1]: Reached target timers.target. Feb 12 19:23:06.742893 systemd[1]: Listening on iscsid.socket. Feb 12 19:23:06.742901 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:23:06.742908 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:23:06.742924 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:23:06.742932 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:23:06.742939 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:23:06.742946 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:23:06.742954 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:23:06.742961 systemd[1]: Reached target sockets.target. Feb 12 19:23:06.742968 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:23:06.742975 systemd[1]: Finished network-cleanup.service. Feb 12 19:23:06.742982 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:23:06.742991 systemd[1]: Starting systemd-journald.service... Feb 12 19:23:06.742998 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:23:06.743005 systemd[1]: Starting systemd-resolved.service... Feb 12 19:23:06.743013 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:23:06.743020 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:23:06.743027 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:23:06.743034 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:23:06.743042 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:23:06.743053 systemd-journald[291]: Journal started Feb 12 19:23:06.743099 systemd-journald[291]: Runtime Journal (/run/log/journal/bc4aaf3fdeb04892a603ce0476300e7c) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:23:06.734745 systemd-modules-load[292]: Inserted module 'overlay' Feb 12 19:23:06.744600 systemd[1]: Started systemd-journald.service. Feb 12 19:23:06.745412 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:23:06.753501 kernel: audit: type=1130 audit(1707765786.742:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.753535 kernel: audit: type=1130 audit(1707765786.745:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.753545 kernel: audit: type=1130 audit(1707765786.746:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.753554 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:23:06.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.747148 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:23:06.755672 systemd-modules-load[292]: Inserted module 'br_netfilter' Feb 12 19:23:06.756642 kernel: Bridge firewalling registered Feb 12 19:23:06.755896 systemd-resolved[293]: Positive Trust Anchors: Feb 12 19:23:06.755903 systemd-resolved[293]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:23:06.755944 systemd-resolved[293]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:23:06.762528 systemd-resolved[293]: Defaulting to hostname 'linux'. Feb 12 19:23:06.764450 systemd[1]: Started systemd-resolved.service. Feb 12 19:23:06.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.766068 systemd[1]: Reached target nss-lookup.target. Feb 12 19:23:06.770316 kernel: audit: type=1130 audit(1707765786.765:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.770338 kernel: SCSI subsystem initialized Feb 12 19:23:06.771531 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:23:06.778114 kernel: audit: type=1130 audit(1707765786.772:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.778143 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:23:06.778153 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:23:06.778162 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:23:06.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.773230 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:23:06.778229 systemd-modules-load[292]: Inserted module 'dm_multipath' Feb 12 19:23:06.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.778966 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:23:06.786312 kernel: audit: type=1130 audit(1707765786.780:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.786334 dracut-cmdline[307]: dracut-dracut-053 Feb 12 19:23:06.784364 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:23:06.792986 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:23:06.793326 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:23:06.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.799950 kernel: audit: type=1130 audit(1707765786.796:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.864946 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:23:06.877952 kernel: iscsi: registered transport (tcp) Feb 12 19:23:06.892955 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:23:06.893014 kernel: QLogic iSCSI HBA Driver Feb 12 19:23:06.931976 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:23:06.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.933530 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:23:06.936282 kernel: audit: type=1130 audit(1707765786.931:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:06.979943 kernel: raid6: neonx8 gen() 11639 MB/s Feb 12 19:23:06.996944 kernel: raid6: neonx8 xor() 10814 MB/s Feb 12 19:23:07.013945 kernel: raid6: neonx4 gen() 13541 MB/s Feb 12 19:23:07.030939 kernel: raid6: neonx4 xor() 11233 MB/s Feb 12 19:23:07.047939 kernel: raid6: neonx2 gen() 12896 MB/s Feb 12 19:23:07.064940 kernel: raid6: neonx2 xor() 10207 MB/s Feb 12 19:23:07.081945 kernel: raid6: neonx1 gen() 10445 MB/s Feb 12 19:23:07.098943 kernel: raid6: neonx1 xor() 8761 MB/s Feb 12 19:23:07.115941 kernel: raid6: int64x8 gen() 6284 MB/s Feb 12 19:23:07.132944 kernel: raid6: int64x8 xor() 3545 MB/s Feb 12 19:23:07.149940 kernel: raid6: int64x4 gen() 7220 MB/s Feb 12 19:23:07.166940 kernel: raid6: int64x4 xor() 3850 MB/s Feb 12 19:23:07.183939 kernel: raid6: int64x2 gen() 6131 MB/s Feb 12 19:23:07.200947 kernel: raid6: int64x2 xor() 3313 MB/s Feb 12 19:23:07.217940 kernel: raid6: int64x1 gen() 5037 MB/s Feb 12 19:23:07.235328 kernel: raid6: int64x1 xor() 2642 MB/s Feb 12 19:23:07.235348 kernel: raid6: using algorithm neonx4 gen() 13541 MB/s Feb 12 19:23:07.235358 kernel: raid6: .... xor() 11233 MB/s, rmw enabled Feb 12 19:23:07.235366 kernel: raid6: using neon recovery algorithm Feb 12 19:23:07.246958 kernel: xor: measuring software checksum speed Feb 12 19:23:07.246983 kernel: 8regs : 17289 MB/sec Feb 12 19:23:07.247933 kernel: 32regs : 20739 MB/sec Feb 12 19:23:07.249105 kernel: arm64_neon : 27959 MB/sec Feb 12 19:23:07.249117 kernel: xor: using function: arm64_neon (27959 MB/sec) Feb 12 19:23:07.308945 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:23:07.320076 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:23:07.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:07.322000 audit: BPF prog-id=7 op=LOAD Feb 12 19:23:07.322000 audit: BPF prog-id=8 op=LOAD Feb 12 19:23:07.323930 kernel: audit: type=1130 audit(1707765787.320:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:07.323901 systemd[1]: Starting systemd-udevd.service... Feb 12 19:23:07.338669 systemd-udevd[490]: Using default interface naming scheme 'v252'. Feb 12 19:23:07.342127 systemd[1]: Started systemd-udevd.service. Feb 12 19:23:07.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:07.343875 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:23:07.357357 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 12 19:23:07.390037 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:23:07.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:07.391789 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:23:07.429115 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:23:07.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:07.470839 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:23:07.477079 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:23:07.477134 kernel: GPT:9289727 != 19775487 Feb 12 19:23:07.477144 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:23:07.477153 kernel: GPT:9289727 != 19775487 Feb 12 19:23:07.477944 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:23:07.477972 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:23:07.496944 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (553) Feb 12 19:23:07.498532 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:23:07.499319 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:23:07.506907 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:23:07.510195 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:23:07.513393 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:23:07.515245 systemd[1]: Starting disk-uuid.service... Feb 12 19:23:07.521427 disk-uuid[561]: Primary Header is updated. Feb 12 19:23:07.521427 disk-uuid[561]: Secondary Entries is updated. Feb 12 19:23:07.521427 disk-uuid[561]: Secondary Header is updated. Feb 12 19:23:07.527944 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:23:08.544425 disk-uuid[562]: The operation has completed successfully. Feb 12 19:23:08.545854 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:23:08.578481 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:23:08.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.578583 systemd[1]: Finished disk-uuid.service. Feb 12 19:23:08.580259 systemd[1]: Starting verity-setup.service... Feb 12 19:23:08.594947 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:23:08.623946 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:23:08.625964 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:23:08.628863 systemd[1]: Finished verity-setup.service. Feb 12 19:23:08.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.686814 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:23:08.688218 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:23:08.687716 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:23:08.688480 systemd[1]: Starting ignition-setup.service... Feb 12 19:23:08.690894 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:23:08.698962 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:23:08.699012 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:23:08.699022 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:23:08.708625 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:23:08.768867 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:23:08.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.770000 audit: BPF prog-id=9 op=LOAD Feb 12 19:23:08.771272 systemd[1]: Starting systemd-networkd.service... Feb 12 19:23:08.774836 systemd[1]: Finished ignition-setup.service. Feb 12 19:23:08.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.776642 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:23:08.799225 systemd-networkd[731]: lo: Link UP Feb 12 19:23:08.799238 systemd-networkd[731]: lo: Gained carrier Feb 12 19:23:08.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.799615 systemd-networkd[731]: Enumeration completed Feb 12 19:23:08.799734 systemd[1]: Started systemd-networkd.service. Feb 12 19:23:08.799989 systemd-networkd[731]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:23:08.800787 systemd[1]: Reached target network.target. Feb 12 19:23:08.801405 systemd-networkd[731]: eth0: Link UP Feb 12 19:23:08.801409 systemd-networkd[731]: eth0: Gained carrier Feb 12 19:23:08.802817 systemd[1]: Starting iscsiuio.service... Feb 12 19:23:08.819671 systemd[1]: Started iscsiuio.service. Feb 12 19:23:08.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.821630 systemd[1]: Starting iscsid.service... Feb 12 19:23:08.826106 iscsid[738]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:23:08.826106 iscsid[738]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:23:08.826106 iscsid[738]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:23:08.826106 iscsid[738]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:23:08.826106 iscsid[738]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:23:08.826106 iscsid[738]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:23:08.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.832622 systemd-networkd[731]: eth0: DHCPv4 address 10.0.0.87/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:23:08.832659 systemd[1]: Started iscsid.service. Feb 12 19:23:08.835761 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:23:08.849596 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:23:08.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.850937 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:23:08.852695 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:23:08.854092 systemd[1]: Reached target remote-fs.target. Feb 12 19:23:08.856940 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:23:08.866369 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:23:08.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:08.900869 ignition[733]: Ignition 2.14.0 Feb 12 19:23:08.900880 ignition[733]: Stage: fetch-offline Feb 12 19:23:08.900947 ignition[733]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:23:08.900957 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:23:08.901095 ignition[733]: parsed url from cmdline: "" Feb 12 19:23:08.901098 ignition[733]: no config URL provided Feb 12 19:23:08.901103 ignition[733]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:23:08.901111 ignition[733]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:23:08.901129 ignition[733]: op(1): [started] loading QEMU firmware config module Feb 12 19:23:08.901133 ignition[733]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:23:08.910712 ignition[733]: op(1): [finished] loading QEMU firmware config module Feb 12 19:23:08.980620 ignition[733]: parsing config with SHA512: 826f9f0b74c285d79155359f2eb7676e3219364238d21381bf789d8f8260e65740ba15682394f1328025e08c4b75a1bb7dac75f219c52eb8a856f46165b7ad55 Feb 12 19:23:09.024888 unknown[733]: fetched base config from "system" Feb 12 19:23:09.024901 unknown[733]: fetched user config from "qemu" Feb 12 19:23:09.027135 ignition[733]: fetch-offline: fetch-offline passed Feb 12 19:23:09.027238 ignition[733]: Ignition finished successfully Feb 12 19:23:09.028368 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:23:09.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.029256 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:23:09.030086 systemd[1]: Starting ignition-kargs.service... Feb 12 19:23:09.039447 ignition[760]: Ignition 2.14.0 Feb 12 19:23:09.039457 ignition[760]: Stage: kargs Feb 12 19:23:09.039564 ignition[760]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:23:09.039575 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:23:09.042155 systemd[1]: Finished ignition-kargs.service. Feb 12 19:23:09.040819 ignition[760]: kargs: kargs passed Feb 12 19:23:09.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.044309 systemd[1]: Starting ignition-disks.service... Feb 12 19:23:09.040867 ignition[760]: Ignition finished successfully Feb 12 19:23:09.051260 ignition[766]: Ignition 2.14.0 Feb 12 19:23:09.051270 ignition[766]: Stage: disks Feb 12 19:23:09.051363 ignition[766]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:23:09.051373 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:23:09.052602 ignition[766]: disks: disks passed Feb 12 19:23:09.052646 ignition[766]: Ignition finished successfully Feb 12 19:23:09.055883 systemd[1]: Finished ignition-disks.service. Feb 12 19:23:09.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.056691 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:23:09.057841 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:23:09.059041 systemd[1]: Reached target local-fs.target. Feb 12 19:23:09.060114 systemd[1]: Reached target sysinit.target. Feb 12 19:23:09.061159 systemd[1]: Reached target basic.target. Feb 12 19:23:09.063193 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:23:09.080262 systemd-fsck[774]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:23:09.095738 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:23:09.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.100825 systemd[1]: Mounting sysroot.mount... Feb 12 19:23:09.107935 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:23:09.108586 systemd[1]: Mounted sysroot.mount. Feb 12 19:23:09.109447 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:23:09.111593 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:23:09.112631 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:23:09.112678 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:23:09.112711 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:23:09.114580 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:23:09.116266 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:23:09.120943 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:23:09.126204 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:23:09.130136 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:23:09.134800 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:23:09.165594 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:23:09.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.167540 systemd[1]: Starting ignition-mount.service... Feb 12 19:23:09.168974 systemd[1]: Starting sysroot-boot.service... Feb 12 19:23:09.173622 bash[825]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:23:09.182850 ignition[827]: INFO : Ignition 2.14.0 Feb 12 19:23:09.182850 ignition[827]: INFO : Stage: mount Feb 12 19:23:09.184815 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:23:09.184815 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:23:09.184815 ignition[827]: INFO : mount: mount passed Feb 12 19:23:09.184815 ignition[827]: INFO : Ignition finished successfully Feb 12 19:23:09.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:09.185642 systemd[1]: Finished sysroot-boot.service. Feb 12 19:23:09.186828 systemd[1]: Finished ignition-mount.service. Feb 12 19:23:09.636569 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:23:09.643946 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) Feb 12 19:23:09.646049 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:23:09.646081 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:23:09.646092 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:23:09.651959 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:23:09.653764 systemd[1]: Starting ignition-files.service... Feb 12 19:23:09.668103 ignition[855]: INFO : Ignition 2.14.0 Feb 12 19:23:09.668103 ignition[855]: INFO : Stage: files Feb 12 19:23:09.669823 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:23:09.669823 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:23:09.669823 ignition[855]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:23:09.673874 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:23:09.673874 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:23:09.676957 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:23:09.676957 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:23:09.679571 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:23:09.679571 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:23:09.679571 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:23:09.678463 unknown[855]: wrote ssh authorized keys file for user: core Feb 12 19:23:09.920144 systemd-networkd[731]: eth0: Gained IPv6LL Feb 12 19:23:10.021906 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:23:10.269222 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:23:10.271478 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:23:10.272995 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:23:10.272995 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:23:10.480915 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:23:10.674987 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:23:10.674987 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:23:10.678658 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:23:10.678658 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 19:23:10.732402 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:23:10.776056 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:23:10.777684 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:23:10.777684 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:23:10.827605 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:23:11.139893 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 12 19:23:11.139893 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:23:11.143433 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:23:11.143433 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:23:11.166431 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:23:12.036842 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 12 19:23:12.036842 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:23:12.042171 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:23:12.042171 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Feb 12 19:23:12.069005 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:23:12.453255 ignition[855]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Feb 12 19:23:12.453255 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:23:12.457519 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:23:12.457519 ignition[855]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:23:12.457519 ignition[855]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:23:12.457519 ignition[855]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:23:12.457519 ignition[855]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:23:12.457519 ignition[855]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(18): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:23:12.487018 ignition[855]: INFO : files: op(18): op(19): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:23:12.521704 ignition[855]: INFO : files: op(18): op(19): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:23:12.525012 ignition[855]: INFO : files: op(18): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:23:12.525012 ignition[855]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:23:12.525012 ignition[855]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:23:12.525012 ignition[855]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:23:12.525012 ignition[855]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:23:12.525012 ignition[855]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:23:12.525012 ignition[855]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:23:12.525012 ignition[855]: INFO : files: files passed Feb 12 19:23:12.525012 ignition[855]: INFO : Ignition finished successfully Feb 12 19:23:12.546227 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:23:12.546249 kernel: audit: type=1130 audit(1707765792.524:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.546261 kernel: audit: type=1130 audit(1707765792.534:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.546270 kernel: audit: type=1131 audit(1707765792.534:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.546279 kernel: audit: type=1130 audit(1707765792.540:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.523882 systemd[1]: Finished ignition-files.service. Feb 12 19:23:12.526033 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:23:12.529297 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:23:12.549821 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:23:12.530204 systemd[1]: Starting ignition-quench.service... Feb 12 19:23:12.551598 initrd-setup-root-after-ignition[883]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:23:12.533783 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:23:12.533874 systemd[1]: Finished ignition-quench.service. Feb 12 19:23:12.535182 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:23:12.540914 systemd[1]: Reached target ignition-complete.target. Feb 12 19:23:12.546091 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:23:12.561094 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:23:12.561197 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:23:12.566852 kernel: audit: type=1130 audit(1707765792.562:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.566875 kernel: audit: type=1131 audit(1707765792.562:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.562855 systemd[1]: Reached target initrd-fs.target. Feb 12 19:23:12.567679 systemd[1]: Reached target initrd.target. Feb 12 19:23:12.569016 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:23:12.570005 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:23:12.580552 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:23:12.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.582311 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:23:12.584799 kernel: audit: type=1130 audit(1707765792.581:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.590914 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:23:12.591859 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:23:12.593232 systemd[1]: Stopped target timers.target. Feb 12 19:23:12.594485 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:23:12.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.594603 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:23:12.599243 kernel: audit: type=1131 audit(1707765792.595:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.595782 systemd[1]: Stopped target initrd.target. Feb 12 19:23:12.598843 systemd[1]: Stopped target basic.target. Feb 12 19:23:12.600023 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:23:12.601319 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:23:12.602591 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:23:12.603964 systemd[1]: Stopped target remote-fs.target. Feb 12 19:23:12.605201 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:23:12.606572 systemd[1]: Stopped target sysinit.target. Feb 12 19:23:12.607779 systemd[1]: Stopped target local-fs.target. Feb 12 19:23:12.609028 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:23:12.610274 systemd[1]: Stopped target swap.target. Feb 12 19:23:12.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.611369 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:23:12.616295 kernel: audit: type=1131 audit(1707765792.612:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.611493 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:23:12.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.612739 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:23:12.620698 kernel: audit: type=1131 audit(1707765792.616:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.615670 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:23:12.615803 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:23:12.617259 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:23:12.617373 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:23:12.620390 systemd[1]: Stopped target paths.target. Feb 12 19:23:12.621456 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:23:12.624970 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:23:12.626142 systemd[1]: Stopped target slices.target. Feb 12 19:23:12.627382 systemd[1]: Stopped target sockets.target. Feb 12 19:23:12.628561 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:23:12.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.628690 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:23:12.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.630016 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:23:12.630128 systemd[1]: Stopped ignition-files.service. Feb 12 19:23:12.633372 systemd[1]: Stopping ignition-mount.service... Feb 12 19:23:12.634400 systemd[1]: Stopping iscsid.service... Feb 12 19:23:12.637398 iscsid[738]: iscsid shutting down. Feb 12 19:23:12.638884 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:23:12.639478 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:23:12.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.639671 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:23:12.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.643450 ignition[896]: INFO : Ignition 2.14.0 Feb 12 19:23:12.643450 ignition[896]: INFO : Stage: umount Feb 12 19:23:12.643450 ignition[896]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:23:12.643450 ignition[896]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:23:12.643450 ignition[896]: INFO : umount: umount passed Feb 12 19:23:12.643450 ignition[896]: INFO : Ignition finished successfully Feb 12 19:23:12.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.640904 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:23:12.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.641049 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:23:12.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.644038 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:23:12.644157 systemd[1]: Stopped iscsid.service. Feb 12 19:23:12.645152 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:23:12.645227 systemd[1]: Closed iscsid.socket. Feb 12 19:23:12.646540 systemd[1]: Stopping iscsiuio.service... Feb 12 19:23:12.649450 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:23:12.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.649593 systemd[1]: Stopped iscsiuio.service. Feb 12 19:23:12.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.650965 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:23:12.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.651045 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:23:12.652387 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:23:12.652468 systemd[1]: Stopped ignition-mount.service. Feb 12 19:23:12.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.654790 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:23:12.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.655788 systemd[1]: Stopped target network.target. Feb 12 19:23:12.657135 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:23:12.657174 systemd[1]: Closed iscsiuio.socket. Feb 12 19:23:12.658206 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:23:12.658248 systemd[1]: Stopped ignition-disks.service. Feb 12 19:23:12.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.659377 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:23:12.659418 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:23:12.660622 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:23:12.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.660660 systemd[1]: Stopped ignition-setup.service. Feb 12 19:23:12.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.662207 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:23:12.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.663407 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:23:12.664814 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:23:12.664912 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:23:12.665990 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:23:12.666031 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:23:12.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.668990 systemd-networkd[731]: eth0: DHCPv6 lease lost Feb 12 19:23:12.685000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:23:12.670080 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:23:12.670171 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:23:12.671788 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:23:12.671818 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:23:12.688000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:23:12.673449 systemd[1]: Stopping network-cleanup.service... Feb 12 19:23:12.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.674626 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:23:12.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.674697 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:23:12.675721 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:23:12.675785 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:23:12.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.677912 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:23:12.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.677971 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:23:12.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.680452 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:23:12.683043 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:23:12.683599 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:23:12.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.683693 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:23:12.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.689401 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:23:12.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.689538 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:23:12.690671 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:23:12.690775 systemd[1]: Stopped network-cleanup.service. Feb 12 19:23:12.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:12.691814 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:23:12.691850 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:23:12.693146 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:23:12.693179 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:23:12.694456 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:23:12.694507 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:23:12.695713 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:23:12.695759 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:23:12.696970 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:23:12.697010 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:23:12.699314 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:23:12.700285 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:23:12.700345 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:23:12.702555 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:23:12.702596 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:23:12.703493 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:23:12.703535 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:23:12.705704 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:23:12.706190 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:23:12.706275 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:23:12.707801 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:23:12.709797 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:23:12.716793 systemd[1]: Switching root. Feb 12 19:23:12.734255 systemd-journald[291]: Journal stopped Feb 12 19:23:14.913185 systemd-journald[291]: Received SIGTERM from PID 1 (systemd). Feb 12 19:23:14.913248 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:23:14.913261 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:23:14.913272 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:23:14.913282 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:23:14.913293 kernel: SELinux: policy capability open_perms=1 Feb 12 19:23:14.913307 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:23:14.913317 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:23:14.913327 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:23:14.913336 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:23:14.913347 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:23:14.913357 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:23:14.913367 systemd[1]: Successfully loaded SELinux policy in 35.175ms. Feb 12 19:23:14.913384 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.781ms. Feb 12 19:23:14.913396 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:23:14.913407 systemd[1]: Detected virtualization kvm. Feb 12 19:23:14.913417 systemd[1]: Detected architecture arm64. Feb 12 19:23:14.913430 systemd[1]: Detected first boot. Feb 12 19:23:14.913440 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:23:14.913451 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:23:14.913461 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:23:14.913472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:23:14.913483 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:23:14.913499 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:23:14.913510 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:23:14.913522 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:23:14.913532 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:23:14.913543 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:23:14.913553 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:23:14.913564 systemd[1]: Created slice system-getty.slice. Feb 12 19:23:14.913574 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:23:14.913589 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:23:14.913599 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:23:14.913611 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:23:14.913622 systemd[1]: Created slice user.slice. Feb 12 19:23:14.913632 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:23:14.913643 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:23:14.913653 systemd[1]: Set up automount boot.automount. Feb 12 19:23:14.913664 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:23:14.913674 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:23:14.913685 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:23:14.913697 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:23:14.913707 systemd[1]: Reached target integritysetup.target. Feb 12 19:23:14.913718 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:23:14.913736 systemd[1]: Reached target remote-fs.target. Feb 12 19:23:14.913748 systemd[1]: Reached target slices.target. Feb 12 19:23:14.913760 systemd[1]: Reached target swap.target. Feb 12 19:23:14.913770 systemd[1]: Reached target torcx.target. Feb 12 19:23:14.913780 systemd[1]: Reached target veritysetup.target. Feb 12 19:23:14.913790 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:23:14.913803 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:23:14.913813 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:23:14.913824 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:23:14.913835 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:23:14.913845 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:23:14.913856 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:23:14.913866 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:23:14.913877 systemd[1]: Mounting media.mount... Feb 12 19:23:14.913888 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:23:14.913900 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:23:14.913910 systemd[1]: Mounting tmp.mount... Feb 12 19:23:14.913946 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:23:14.913958 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:23:14.913968 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:23:14.913979 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:23:14.913989 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:23:14.914000 systemd[1]: Starting modprobe@drm.service... Feb 12 19:23:14.914011 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:23:14.914022 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:23:14.914033 systemd[1]: Starting modprobe@loop.service... Feb 12 19:23:14.914044 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:23:14.914054 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:23:14.914064 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:23:14.914075 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:23:14.914086 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:23:14.914096 systemd[1]: Stopped systemd-journald.service. Feb 12 19:23:14.914106 systemd[1]: Starting systemd-journald.service... Feb 12 19:23:14.914117 kernel: fuse: init (API version 7.34) Feb 12 19:23:14.914128 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:23:14.914139 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:23:14.914151 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:23:14.914161 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:23:14.914171 kernel: loop: module loaded Feb 12 19:23:14.914182 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:23:14.914194 systemd[1]: Stopped verity-setup.service. Feb 12 19:23:14.914204 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:23:14.914214 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:23:14.914225 systemd[1]: Mounted media.mount. Feb 12 19:23:14.914235 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:23:14.914248 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:23:14.914258 systemd[1]: Mounted tmp.mount. Feb 12 19:23:14.914269 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:23:14.914279 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:23:14.914291 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:23:14.914302 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:23:14.914312 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:23:14.914323 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:23:14.914334 systemd[1]: Finished modprobe@drm.service. Feb 12 19:23:14.914346 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:23:14.914360 systemd-journald[992]: Journal started Feb 12 19:23:14.914402 systemd-journald[992]: Runtime Journal (/run/log/journal/bc4aaf3fdeb04892a603ce0476300e7c) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:23:12.806000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:23:12.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:23:12.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:23:12.986000 audit: BPF prog-id=10 op=LOAD Feb 12 19:23:12.986000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:23:12.986000 audit: BPF prog-id=11 op=LOAD Feb 12 19:23:12.986000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:23:13.033000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:23:13.033000 audit[930]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001cd8ac a1=4000150de0 a2=40001570c0 a3=32 items=0 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:13.033000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:23:13.034000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:23:13.034000 audit[930]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001cd985 a2=1ed a3=0 items=2 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:13.034000 audit: CWD cwd="/" Feb 12 19:23:13.034000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:23:13.034000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:23:13.034000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:23:14.765000 audit: BPF prog-id=12 op=LOAD Feb 12 19:23:14.765000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:23:14.765000 audit: BPF prog-id=13 op=LOAD Feb 12 19:23:14.765000 audit: BPF prog-id=14 op=LOAD Feb 12 19:23:14.765000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:23:14.765000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:23:14.766000 audit: BPF prog-id=15 op=LOAD Feb 12 19:23:14.766000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:23:14.766000 audit: BPF prog-id=16 op=LOAD Feb 12 19:23:14.766000 audit: BPF prog-id=17 op=LOAD Feb 12 19:23:14.766000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:23:14.766000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:23:14.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.776000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:23:14.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.868000 audit: BPF prog-id=18 op=LOAD Feb 12 19:23:14.870000 audit: BPF prog-id=19 op=LOAD Feb 12 19:23:14.870000 audit: BPF prog-id=20 op=LOAD Feb 12 19:23:14.870000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:23:14.870000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:23:14.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.908000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:23:14.908000 audit[992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc23fb440 a2=4000 a3=1 items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:14.908000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:23:14.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:13.032229 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:23:14.761004 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:23:13.032495 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:23:14.761016 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:23:13.032514 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:23:14.767898 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:23:13.032544 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:23:13.032554 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:23:13.032674 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:23:13.032689 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:23:13.032907 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:23:13.032965 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:23:13.032978 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:23:13.033902 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:23:13.033958 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:23:13.033979 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:23:13.033994 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:23:13.034016 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:23:13.034031 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:23:14.481005 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:23:14.917440 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:23:14.481263 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:23:14.481352 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:23:14.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.481510 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:23:14.481555 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:23:14.481609 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2024-02-12T19:23:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:23:14.918942 systemd[1]: Started systemd-journald.service. Feb 12 19:23:14.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.919549 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:23:14.919720 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:23:14.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.920843 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:23:14.921239 systemd[1]: Finished modprobe@loop.service. Feb 12 19:23:14.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.922360 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:23:14.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.923499 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:23:14.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.924658 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:23:14.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.925904 systemd[1]: Reached target network-pre.target. Feb 12 19:23:14.928192 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:23:14.930240 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:23:14.931276 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:23:14.932853 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:23:14.934623 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:23:14.935387 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:23:14.936503 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:23:14.937303 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:23:14.938442 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:23:14.943956 systemd-journald[992]: Time spent on flushing to /var/log/journal/bc4aaf3fdeb04892a603ce0476300e7c is 15.155ms for 1025 entries. Feb 12 19:23:14.943956 systemd-journald[992]: System Journal (/var/log/journal/bc4aaf3fdeb04892a603ce0476300e7c) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:23:14.969520 systemd-journald[992]: Received client request to flush runtime journal. Feb 12 19:23:14.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.940495 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:23:14.945164 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:23:14.950908 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:23:14.970766 udevadm[1025]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:23:14.952075 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:23:14.957871 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:23:14.959504 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:23:14.961596 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:23:14.970492 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:23:14.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.971746 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:23:14.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.973799 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:23:14.989173 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:23:14.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:14.991303 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:23:15.011295 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:23:15.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.324136 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:23:15.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.324000 audit: BPF prog-id=21 op=LOAD Feb 12 19:23:15.324000 audit: BPF prog-id=22 op=LOAD Feb 12 19:23:15.324000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:23:15.324000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:23:15.326330 systemd[1]: Starting systemd-udevd.service... Feb 12 19:23:15.344961 systemd-udevd[1035]: Using default interface naming scheme 'v252'. Feb 12 19:23:15.361729 systemd[1]: Started systemd-udevd.service. Feb 12 19:23:15.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.363000 audit: BPF prog-id=23 op=LOAD Feb 12 19:23:15.365802 systemd[1]: Starting systemd-networkd.service... Feb 12 19:23:15.379348 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:23:15.394000 audit: BPF prog-id=24 op=LOAD Feb 12 19:23:15.394000 audit: BPF prog-id=25 op=LOAD Feb 12 19:23:15.394000 audit: BPF prog-id=26 op=LOAD Feb 12 19:23:15.396189 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:23:15.430659 systemd[1]: Started systemd-userdbd.service. Feb 12 19:23:15.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.440733 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:23:15.457286 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:23:15.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.459454 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:23:15.474333 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:23:15.494564 systemd-networkd[1045]: lo: Link UP Feb 12 19:23:15.494882 systemd-networkd[1045]: lo: Gained carrier Feb 12 19:23:15.495340 systemd-networkd[1045]: Enumeration completed Feb 12 19:23:15.495550 systemd-networkd[1045]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:23:15.495569 systemd[1]: Started systemd-networkd.service. Feb 12 19:23:15.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.498890 systemd-networkd[1045]: eth0: Link UP Feb 12 19:23:15.499011 systemd-networkd[1045]: eth0: Gained carrier Feb 12 19:23:15.509856 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:23:15.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.510711 systemd[1]: Reached target cryptsetup.target. Feb 12 19:23:15.512528 systemd[1]: Starting lvm2-activation.service... Feb 12 19:23:15.516001 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:23:15.529055 systemd-networkd[1045]: eth0: DHCPv4 address 10.0.0.87/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:23:15.552800 systemd[1]: Finished lvm2-activation.service. Feb 12 19:23:15.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.553586 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:23:15.554229 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:23:15.554259 systemd[1]: Reached target local-fs.target. Feb 12 19:23:15.554813 systemd[1]: Reached target machines.target. Feb 12 19:23:15.556584 systemd[1]: Starting ldconfig.service... Feb 12 19:23:15.557813 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:23:15.557941 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:23:15.559351 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:23:15.561153 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:23:15.563472 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:23:15.564475 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:23:15.564536 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:23:15.565508 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:23:15.571584 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1071 (bootctl) Feb 12 19:23:15.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.572772 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:23:15.578546 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:23:15.579942 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:23:15.581999 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:23:15.584596 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:23:15.672504 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) Feb 12 19:23:15.672504 systemd-fsck[1080]: /dev/vda1: 236 files, 113719/258078 clusters Feb 12 19:23:15.675106 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:23:15.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.692880 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:23:15.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.788827 ldconfig[1070]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:23:15.793419 systemd[1]: Finished ldconfig.service. Feb 12 19:23:15.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.896259 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:23:15.897641 systemd[1]: Mounting boot.mount... Feb 12 19:23:15.904220 systemd[1]: Mounted boot.mount. Feb 12 19:23:15.914569 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:23:15.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.967593 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:23:15.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.969681 systemd[1]: Starting audit-rules.service... Feb 12 19:23:15.971430 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:23:15.973639 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:23:15.974000 audit: BPF prog-id=27 op=LOAD Feb 12 19:23:15.976269 systemd[1]: Starting systemd-resolved.service... Feb 12 19:23:15.976000 audit: BPF prog-id=28 op=LOAD Feb 12 19:23:15.978889 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:23:15.981087 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:23:15.984349 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:23:15.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.986029 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:23:15.991000 audit[1089]: SYSTEM_BOOT pid=1089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:23:15.995821 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:23:15.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:16.007080 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:23:16.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:16.009787 systemd[1]: Starting systemd-update-done.service... Feb 12 19:23:16.019162 systemd[1]: Finished systemd-update-done.service. Feb 12 19:23:16.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:16.029000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:23:16.029000 audit[1104]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe30349b0 a2=420 a3=0 items=0 ppid=1083 pid=1104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:16.029000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:23:16.030542 augenrules[1104]: No rules Feb 12 19:23:16.031661 systemd[1]: Finished audit-rules.service. Feb 12 19:23:16.033331 systemd-resolved[1087]: Positive Trust Anchors: Feb 12 19:23:16.033343 systemd-resolved[1087]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:23:16.033375 systemd-resolved[1087]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:23:16.047444 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:23:16.501535 systemd-timesyncd[1088]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:23:16.501676 systemd[1]: Reached target time-set.target. Feb 12 19:23:16.501707 systemd-resolved[1087]: Defaulting to hostname 'linux'. Feb 12 19:23:16.501941 systemd-timesyncd[1088]: Initial clock synchronization to Mon 2024-02-12 19:23:16.501420 UTC. Feb 12 19:23:16.503107 systemd[1]: Started systemd-resolved.service. Feb 12 19:23:16.503985 systemd[1]: Reached target network.target. Feb 12 19:23:16.504772 systemd[1]: Reached target nss-lookup.target. Feb 12 19:23:16.505547 systemd[1]: Reached target sysinit.target. Feb 12 19:23:16.506409 systemd[1]: Started motdgen.path. Feb 12 19:23:16.507136 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:23:16.508348 systemd[1]: Started logrotate.timer. Feb 12 19:23:16.509187 systemd[1]: Started mdadm.timer. Feb 12 19:23:16.509904 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:23:16.510736 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:23:16.510774 systemd[1]: Reached target paths.target. Feb 12 19:23:16.511490 systemd[1]: Reached target timers.target. Feb 12 19:23:16.512641 systemd[1]: Listening on dbus.socket. Feb 12 19:23:16.514579 systemd[1]: Starting docker.socket... Feb 12 19:23:16.518085 systemd[1]: Listening on sshd.socket. Feb 12 19:23:16.518979 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:23:16.519426 systemd[1]: Listening on docker.socket. Feb 12 19:23:16.520292 systemd[1]: Reached target sockets.target. Feb 12 19:23:16.521132 systemd[1]: Reached target basic.target. Feb 12 19:23:16.522494 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:23:16.522528 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:23:16.523654 systemd[1]: Starting containerd.service... Feb 12 19:23:16.526440 systemd[1]: Starting dbus.service... Feb 12 19:23:16.528429 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:23:16.530490 systemd[1]: Starting extend-filesystems.service... Feb 12 19:23:16.531336 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:23:16.532937 systemd[1]: Starting motdgen.service... Feb 12 19:23:16.537777 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:23:16.540035 systemd[1]: Starting prepare-critools.service... Feb 12 19:23:16.542513 systemd[1]: Starting prepare-helm.service... Feb 12 19:23:16.544906 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:23:16.547117 systemd[1]: Starting sshd-keygen.service... Feb 12 19:23:16.550249 systemd[1]: Starting systemd-logind.service... Feb 12 19:23:16.558224 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:23:16.558328 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:23:16.558913 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:23:16.560058 systemd[1]: Starting update-engine.service... Feb 12 19:23:16.562800 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:23:16.565522 jq[1132]: true Feb 12 19:23:16.568152 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:23:16.568363 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda1 Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda2 Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda3 Feb 12 19:23:16.578086 extend-filesystems[1115]: Found usr Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda4 Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda6 Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda7 Feb 12 19:23:16.578086 extend-filesystems[1115]: Found vda9 Feb 12 19:23:16.578086 extend-filesystems[1115]: Checking size of /dev/vda9 Feb 12 19:23:16.610082 jq[1137]: true Feb 12 19:23:16.610269 jq[1114]: false Feb 12 19:23:16.610343 tar[1135]: crictl Feb 12 19:23:16.610524 tar[1136]: linux-arm64/helm Feb 12 19:23:16.610643 tar[1134]: ./ Feb 12 19:23:16.610643 tar[1134]: ./loopback Feb 12 19:23:16.586716 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:23:16.586893 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:23:16.612910 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:23:16.613077 systemd[1]: Finished motdgen.service. Feb 12 19:23:16.627914 extend-filesystems[1115]: Resized partition /dev/vda9 Feb 12 19:23:16.639281 extend-filesystems[1163]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:23:16.654446 dbus-daemon[1113]: [system] SELinux support is enabled Feb 12 19:23:16.654606 systemd[1]: Started dbus.service. Feb 12 19:23:16.656934 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:23:16.656961 systemd[1]: Reached target system-config.target. Feb 12 19:23:16.658504 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:23:16.658546 systemd[1]: Reached target user-config.target. Feb 12 19:23:16.658680 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:23:16.660330 systemd-logind[1126]: Watching system buttons on /dev/input/event0 (Power Button) Feb 12 19:23:16.660564 systemd-logind[1126]: New seat seat0. Feb 12 19:23:16.662050 systemd[1]: Started systemd-logind.service. Feb 12 19:23:16.687759 tar[1134]: ./bandwidth Feb 12 19:23:16.712693 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:23:16.733268 extend-filesystems[1163]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:23:16.733268 extend-filesystems[1163]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:23:16.733268 extend-filesystems[1163]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:23:16.736303 extend-filesystems[1115]: Resized filesystem in /dev/vda9 Feb 12 19:23:16.737341 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:23:16.737523 systemd[1]: Finished extend-filesystems.service. Feb 12 19:23:16.740231 bash[1167]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:23:16.743334 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:23:16.744039 env[1138]: time="2024-02-12T19:23:16.743988797Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:23:16.744278 update_engine[1128]: I0212 19:23:16.743484 1128 main.cc:92] Flatcar Update Engine starting Feb 12 19:23:16.746252 systemd[1]: Started update-engine.service. Feb 12 19:23:16.746357 update_engine[1128]: I0212 19:23:16.746305 1128 update_check_scheduler.cc:74] Next update check in 2m28s Feb 12 19:23:16.748686 systemd[1]: Started locksmithd.service. Feb 12 19:23:16.794067 env[1138]: time="2024-02-12T19:23:16.794010077Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:23:16.794201 env[1138]: time="2024-02-12T19:23:16.794187277Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:23:16.795821 env[1138]: time="2024-02-12T19:23:16.795776517Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:23:16.795821 env[1138]: time="2024-02-12T19:23:16.795816477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796070 env[1138]: time="2024-02-12T19:23:16.796041237Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796070 env[1138]: time="2024-02-12T19:23:16.796065117Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796144 env[1138]: time="2024-02-12T19:23:16.796079517Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:23:16.796144 env[1138]: time="2024-02-12T19:23:16.796089757Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796182 env[1138]: time="2024-02-12T19:23:16.796171877Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796563 env[1138]: time="2024-02-12T19:23:16.796469397Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796641 env[1138]: time="2024-02-12T19:23:16.796616437Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:23:16.796641 env[1138]: time="2024-02-12T19:23:16.796637997Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:23:16.796735 env[1138]: time="2024-02-12T19:23:16.796708677Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:23:16.796735 env[1138]: time="2024-02-12T19:23:16.796721077Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:23:16.798595 tar[1134]: ./ptp Feb 12 19:23:16.802412 env[1138]: time="2024-02-12T19:23:16.802341677Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:23:16.802412 env[1138]: time="2024-02-12T19:23:16.802390637Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:23:16.802412 env[1138]: time="2024-02-12T19:23:16.802404117Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:23:16.802538 env[1138]: time="2024-02-12T19:23:16.802441357Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802538 env[1138]: time="2024-02-12T19:23:16.802455397Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802538 env[1138]: time="2024-02-12T19:23:16.802476037Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802538 env[1138]: time="2024-02-12T19:23:16.802488917Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802891 env[1138]: time="2024-02-12T19:23:16.802866237Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802933 env[1138]: time="2024-02-12T19:23:16.802891877Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802933 env[1138]: time="2024-02-12T19:23:16.802907357Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.802933 env[1138]: time="2024-02-12T19:23:16.802920877Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.803002 env[1138]: time="2024-02-12T19:23:16.802937997Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:23:16.803099 env[1138]: time="2024-02-12T19:23:16.803075997Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:23:16.803175 env[1138]: time="2024-02-12T19:23:16.803156357Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:23:16.803390 env[1138]: time="2024-02-12T19:23:16.803371797Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:23:16.803433 env[1138]: time="2024-02-12T19:23:16.803399717Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803433 env[1138]: time="2024-02-12T19:23:16.803415277Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:23:16.803569 env[1138]: time="2024-02-12T19:23:16.803549877Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803611 env[1138]: time="2024-02-12T19:23:16.803568597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803611 env[1138]: time="2024-02-12T19:23:16.803586397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803611 env[1138]: time="2024-02-12T19:23:16.803597917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803611 env[1138]: time="2024-02-12T19:23:16.803609237Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803698 env[1138]: time="2024-02-12T19:23:16.803621797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803698 env[1138]: time="2024-02-12T19:23:16.803632717Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803698 env[1138]: time="2024-02-12T19:23:16.803643757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803698 env[1138]: time="2024-02-12T19:23:16.803677797Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:23:16.803824 env[1138]: time="2024-02-12T19:23:16.803801837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803857 env[1138]: time="2024-02-12T19:23:16.803824077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803857 env[1138]: time="2024-02-12T19:23:16.803837277Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.803857 env[1138]: time="2024-02-12T19:23:16.803850077Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:23:16.803917 env[1138]: time="2024-02-12T19:23:16.803864037Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:23:16.803917 env[1138]: time="2024-02-12T19:23:16.803875597Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:23:16.803917 env[1138]: time="2024-02-12T19:23:16.803893117Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:23:16.803974 env[1138]: time="2024-02-12T19:23:16.803927397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:23:16.804193 env[1138]: time="2024-02-12T19:23:16.804127237Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:23:16.804193 env[1138]: time="2024-02-12T19:23:16.804192277Z" level=info msg="Connect containerd service" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.804236197Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.804861437Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805417037Z" level=info msg="Start subscribing containerd event" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805475397Z" level=info msg="Start recovering state" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805556357Z" level=info msg="Start event monitor" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805590077Z" level=info msg="Start snapshots syncer" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805601717Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805609157Z" level=info msg="Start streaming server" Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805817437Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:23:16.806904 env[1138]: time="2024-02-12T19:23:16.805858357Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:23:16.806080 systemd[1]: Started containerd.service. Feb 12 19:23:16.813490 env[1138]: time="2024-02-12T19:23:16.813439277Z" level=info msg="containerd successfully booted in 0.076629s" Feb 12 19:23:16.855709 tar[1134]: ./vlan Feb 12 19:23:16.903282 tar[1134]: ./host-device Feb 12 19:23:16.952216 tar[1134]: ./tuning Feb 12 19:23:16.998018 tar[1134]: ./vrf Feb 12 19:23:17.039967 tar[1134]: ./sbr Feb 12 19:23:17.062233 tar[1136]: linux-arm64/LICENSE Feb 12 19:23:17.062233 tar[1136]: linux-arm64/README.md Feb 12 19:23:17.066444 systemd[1]: Finished prepare-helm.service. Feb 12 19:23:17.079715 tar[1134]: ./tap Feb 12 19:23:17.104742 systemd[1]: Finished prepare-critools.service. Feb 12 19:23:17.114641 tar[1134]: ./dhcp Feb 12 19:23:17.117885 locksmithd[1176]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:23:17.187145 tar[1134]: ./static Feb 12 19:23:17.208355 tar[1134]: ./firewall Feb 12 19:23:17.240454 tar[1134]: ./macvlan Feb 12 19:23:17.269496 tar[1134]: ./dummy Feb 12 19:23:17.297938 tar[1134]: ./bridge Feb 12 19:23:17.329093 tar[1134]: ./ipvlan Feb 12 19:23:17.357684 tar[1134]: ./portmap Feb 12 19:23:17.384711 tar[1134]: ./host-local Feb 12 19:23:17.420464 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:23:17.798683 systemd-networkd[1045]: eth0: Gained IPv6LL Feb 12 19:23:18.954579 sshd_keygen[1140]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:23:18.972341 systemd[1]: Finished sshd-keygen.service. Feb 12 19:23:18.974760 systemd[1]: Starting issuegen.service... Feb 12 19:23:18.979249 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:23:18.979408 systemd[1]: Finished issuegen.service. Feb 12 19:23:18.981635 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:23:18.990131 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:23:18.992753 systemd[1]: Started getty@tty1.service. Feb 12 19:23:18.995096 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:23:18.996229 systemd[1]: Reached target getty.target. Feb 12 19:23:18.997094 systemd[1]: Reached target multi-user.target. Feb 12 19:23:18.999395 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:23:19.006380 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:23:19.006567 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:23:19.007429 systemd[1]: Startup finished in 596ms (kernel) + 6.182s (initrd) + 5.790s (userspace) = 12.569s. Feb 12 19:23:19.624703 systemd[1]: Created slice system-sshd.slice. Feb 12 19:23:19.625825 systemd[1]: Started sshd@0-10.0.0.87:22-10.0.0.1:34194.service. Feb 12 19:23:19.668028 sshd[1203]: Accepted publickey for core from 10.0.0.1 port 34194 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:19.670654 sshd[1203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:19.679992 systemd-logind[1126]: New session 1 of user core. Feb 12 19:23:19.680963 systemd[1]: Created slice user-500.slice. Feb 12 19:23:19.682194 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:23:19.690811 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:23:19.692327 systemd[1]: Starting user@500.service... Feb 12 19:23:19.695515 (systemd)[1206]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:19.760699 systemd[1206]: Queued start job for default target default.target. Feb 12 19:23:19.761232 systemd[1206]: Reached target paths.target. Feb 12 19:23:19.761252 systemd[1206]: Reached target sockets.target. Feb 12 19:23:19.761264 systemd[1206]: Reached target timers.target. Feb 12 19:23:19.761275 systemd[1206]: Reached target basic.target. Feb 12 19:23:19.761332 systemd[1206]: Reached target default.target. Feb 12 19:23:19.761357 systemd[1206]: Startup finished in 59ms. Feb 12 19:23:19.761609 systemd[1]: Started user@500.service. Feb 12 19:23:19.762825 systemd[1]: Started session-1.scope. Feb 12 19:23:19.815540 systemd[1]: Started sshd@1-10.0.0.87:22-10.0.0.1:34202.service. Feb 12 19:23:19.858943 sshd[1215]: Accepted publickey for core from 10.0.0.1 port 34202 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:19.860278 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:19.864649 systemd-logind[1126]: New session 2 of user core. Feb 12 19:23:19.865506 systemd[1]: Started session-2.scope. Feb 12 19:23:19.924678 sshd[1215]: pam_unix(sshd:session): session closed for user core Feb 12 19:23:19.928675 systemd[1]: Started sshd@2-10.0.0.87:22-10.0.0.1:34210.service. Feb 12 19:23:19.929561 systemd-logind[1126]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:23:19.929778 systemd[1]: sshd@1-10.0.0.87:22-10.0.0.1:34202.service: Deactivated successfully. Feb 12 19:23:19.930831 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:23:19.931432 systemd-logind[1126]: Removed session 2. Feb 12 19:23:19.966611 sshd[1220]: Accepted publickey for core from 10.0.0.1 port 34210 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:19.968180 sshd[1220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:19.972052 systemd-logind[1126]: New session 3 of user core. Feb 12 19:23:19.972978 systemd[1]: Started session-3.scope. Feb 12 19:23:20.022343 sshd[1220]: pam_unix(sshd:session): session closed for user core Feb 12 19:23:20.027931 systemd[1]: sshd@2-10.0.0.87:22-10.0.0.1:34210.service: Deactivated successfully. Feb 12 19:23:20.028979 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:23:20.029814 systemd-logind[1126]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:23:20.031466 systemd[1]: Started sshd@3-10.0.0.87:22-10.0.0.1:34222.service. Feb 12 19:23:20.032745 systemd-logind[1126]: Removed session 3. Feb 12 19:23:20.069744 sshd[1227]: Accepted publickey for core from 10.0.0.1 port 34222 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:20.071129 sshd[1227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:20.074797 systemd-logind[1126]: New session 4 of user core. Feb 12 19:23:20.076803 systemd[1]: Started session-4.scope. Feb 12 19:23:20.134076 sshd[1227]: pam_unix(sshd:session): session closed for user core Feb 12 19:23:20.141338 systemd[1]: sshd@3-10.0.0.87:22-10.0.0.1:34222.service: Deactivated successfully. Feb 12 19:23:20.142435 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:23:20.143308 systemd-logind[1126]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:23:20.145417 systemd[1]: Started sshd@4-10.0.0.87:22-10.0.0.1:34232.service. Feb 12 19:23:20.146735 systemd-logind[1126]: Removed session 4. Feb 12 19:23:20.181464 sshd[1233]: Accepted publickey for core from 10.0.0.1 port 34232 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:20.183560 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:20.187640 systemd-logind[1126]: New session 5 of user core. Feb 12 19:23:20.189836 systemd[1]: Started session-5.scope. Feb 12 19:23:20.285579 sudo[1236]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:23:20.286122 sudo[1236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:23:20.302844 dbus-daemon[1113]: avc: received setenforce notice (enforcing=1) Feb 12 19:23:20.303847 sudo[1236]: pam_unix(sudo:session): session closed for user root Feb 12 19:23:20.307363 sshd[1233]: pam_unix(sshd:session): session closed for user core Feb 12 19:23:20.314799 systemd[1]: Started sshd@5-10.0.0.87:22-10.0.0.1:34248.service. Feb 12 19:23:20.316383 systemd[1]: sshd@4-10.0.0.87:22-10.0.0.1:34232.service: Deactivated successfully. Feb 12 19:23:20.318613 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:23:20.319540 systemd-logind[1126]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:23:20.320418 systemd-logind[1126]: Removed session 5. Feb 12 19:23:20.353820 sshd[1239]: Accepted publickey for core from 10.0.0.1 port 34248 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:20.356398 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:20.362325 systemd-logind[1126]: New session 6 of user core. Feb 12 19:23:20.363280 systemd[1]: Started session-6.scope. Feb 12 19:23:20.427942 sudo[1244]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:23:20.428162 sudo[1244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:23:20.431131 sudo[1244]: pam_unix(sudo:session): session closed for user root Feb 12 19:23:20.436999 sudo[1243]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:23:20.437717 sudo[1243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:23:20.448000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:23:20.449839 auditctl[1247]: No rules Feb 12 19:23:20.450833 kernel: kauditd_printk_skb: 132 callbacks suppressed Feb 12 19:23:20.450877 kernel: audit: type=1305 audit(1707765800.448:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:23:20.450895 kernel: audit: type=1300 audit(1707765800.448:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd3114800 a2=420 a3=0 items=0 ppid=1 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:20.448000 audit[1247]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd3114800 a2=420 a3=0 items=0 ppid=1 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:20.453485 kernel: audit: type=1327 audit(1707765800.448:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:23:20.448000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:23:20.453719 systemd[1]: Stopping audit-rules.service... Feb 12 19:23:20.454329 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:23:20.454538 systemd[1]: Stopped audit-rules.service. Feb 12 19:23:20.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.456572 kernel: audit: type=1131 audit(1707765800.453:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.456495 systemd[1]: Starting audit-rules.service... Feb 12 19:23:20.494303 augenrules[1264]: No rules Feb 12 19:23:20.495072 systemd[1]: Finished audit-rules.service. Feb 12 19:23:20.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.495981 sudo[1243]: pam_unix(sudo:session): session closed for user root Feb 12 19:23:20.495000 audit[1243]: USER_END pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.499942 kernel: audit: type=1130 audit(1707765800.494:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.499991 kernel: audit: type=1106 audit(1707765800.495:168): pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.500158 sshd[1239]: pam_unix(sshd:session): session closed for user core Feb 12 19:23:20.495000 audit[1243]: CRED_DISP pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.501759 systemd[1]: Started sshd@6-10.0.0.87:22-10.0.0.1:34258.service. Feb 12 19:23:20.502306 kernel: audit: type=1104 audit(1707765800.495:169): pid=1243 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.502354 kernel: audit: type=1130 audit(1707765800.501:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.87:22-10.0.0.1:34258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.87:22-10.0.0.1:34258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.504000 audit[1239]: USER_END pid=1239 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.506896 systemd[1]: sshd@5-10.0.0.87:22-10.0.0.1:34248.service: Deactivated successfully. Feb 12 19:23:20.504000 audit[1239]: CRED_DISP pid=1239 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.507648 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:23:20.508254 systemd-logind[1126]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:23:20.509201 systemd-logind[1126]: Removed session 6. Feb 12 19:23:20.509686 kernel: audit: type=1106 audit(1707765800.504:171): pid=1239 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.509737 kernel: audit: type=1104 audit(1707765800.504:172): pid=1239 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.87:22-10.0.0.1:34248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.536000 audit[1269]: USER_ACCT pid=1269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.537696 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 34258 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:23:20.538000 audit[1269]: CRED_ACQ pid=1269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.538000 audit[1269]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7fd9f30 a2=3 a3=1 items=0 ppid=1 pid=1269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:20.538000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:23:20.539574 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:23:20.543133 systemd-logind[1126]: New session 7 of user core. Feb 12 19:23:20.543983 systemd[1]: Started session-7.scope. Feb 12 19:23:20.547000 audit[1269]: USER_START pid=1269 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.549000 audit[1273]: CRED_ACQ pid=1273 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:20.597000 audit[1274]: USER_ACCT pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.597000 audit[1274]: CRED_REFR pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:20.598017 sudo[1274]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:23:20.598228 sudo[1274]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:23:20.599000 audit[1274]: USER_START pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:21.201062 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:23:21.206693 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:23:21.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:21.206991 systemd[1]: Reached target network-online.target. Feb 12 19:23:21.208358 systemd[1]: Starting docker.service... Feb 12 19:23:21.287385 env[1292]: time="2024-02-12T19:23:21.287321917Z" level=info msg="Starting up" Feb 12 19:23:21.289058 env[1292]: time="2024-02-12T19:23:21.289028597Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:23:21.289058 env[1292]: time="2024-02-12T19:23:21.289053677Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:23:21.289150 env[1292]: time="2024-02-12T19:23:21.289076397Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:23:21.289150 env[1292]: time="2024-02-12T19:23:21.289087557Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:23:21.291202 env[1292]: time="2024-02-12T19:23:21.291169637Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:23:21.291202 env[1292]: time="2024-02-12T19:23:21.291194957Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:23:21.291311 env[1292]: time="2024-02-12T19:23:21.291209357Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:23:21.291311 env[1292]: time="2024-02-12T19:23:21.291218317Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:23:21.701212 env[1292]: time="2024-02-12T19:23:21.701101677Z" level=info msg="Loading containers: start." Feb 12 19:23:21.747000 audit[1329]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.747000 audit[1329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffcd41bf90 a2=0 a3=1 items=0 ppid=1292 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:23:21.750000 audit[1331]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.750000 audit[1331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc6753df0 a2=0 a3=1 items=0 ppid=1292 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:23:21.752000 audit[1333]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.752000 audit[1333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd8acaf40 a2=0 a3=1 items=0 ppid=1292 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:23:21.754000 audit[1335]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.754000 audit[1335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffc8c8bc0 a2=0 a3=1 items=0 ppid=1292 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:23:21.756000 audit[1337]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.756000 audit[1337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe8306920 a2=0 a3=1 items=0 ppid=1292 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:23:21.782000 audit[1342]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.782000 audit[1342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6983e80 a2=0 a3=1 items=0 ppid=1292 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.782000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:23:21.787000 audit[1344]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.787000 audit[1344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffe8533d0 a2=0 a3=1 items=0 ppid=1292 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:23:21.789000 audit[1346]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.789000 audit[1346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff8e6d6e0 a2=0 a3=1 items=0 ppid=1292 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:23:21.791000 audit[1348]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.791000 audit[1348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff29d43d0 a2=0 a3=1 items=0 ppid=1292 pid=1348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:23:21.797000 audit[1352]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.797000 audit[1352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff077e8b0 a2=0 a3=1 items=0 ppid=1292 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:23:21.798000 audit[1353]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.798000 audit[1353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffcf4ed590 a2=0 a3=1 items=0 ppid=1292 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:23:21.804678 kernel: Initializing XFRM netlink socket Feb 12 19:23:21.828940 env[1292]: time="2024-02-12T19:23:21.828901557Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:23:21.843000 audit[1361]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.843000 audit[1361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffca41eb00 a2=0 a3=1 items=0 ppid=1292 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.843000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:23:21.860000 audit[1364]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.860000 audit[1364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff1300520 a2=0 a3=1 items=0 ppid=1292 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.860000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:23:21.862000 audit[1367]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.862000 audit[1367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd61dc760 a2=0 a3=1 items=0 ppid=1292 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:23:21.864000 audit[1369]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.864000 audit[1369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc6e69300 a2=0 a3=1 items=0 ppid=1292 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.864000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:23:21.866000 audit[1371]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.866000 audit[1371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff4ae81d0 a2=0 a3=1 items=0 ppid=1292 pid=1371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.866000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:23:21.868000 audit[1373]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.868000 audit[1373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd9287b20 a2=0 a3=1 items=0 ppid=1292 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:23:21.870000 audit[1375]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.870000 audit[1375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff11f9e20 a2=0 a3=1 items=0 ppid=1292 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:23:21.877000 audit[1378]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.877000 audit[1378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdd02b010 a2=0 a3=1 items=0 ppid=1292 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.877000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:23:21.881000 audit[1380]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.881000 audit[1380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc5e42580 a2=0 a3=1 items=0 ppid=1292 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.881000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:23:21.883000 audit[1382]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.883000 audit[1382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffcf2d1980 a2=0 a3=1 items=0 ppid=1292 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:23:21.885000 audit[1384]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.885000 audit[1384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc9664350 a2=0 a3=1 items=0 ppid=1292 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:23:21.886377 systemd-networkd[1045]: docker0: Link UP Feb 12 19:23:21.892000 audit[1388]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.892000 audit[1388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffabbf8f0 a2=0 a3=1 items=0 ppid=1292 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:23:21.893000 audit[1389]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:21.893000 audit[1389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd291bd70 a2=0 a3=1 items=0 ppid=1292 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:21.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:23:21.894822 env[1292]: time="2024-02-12T19:23:21.894785597Z" level=info msg="Loading containers: done." Feb 12 19:23:21.911719 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1142427874-merged.mount: Deactivated successfully. Feb 12 19:23:21.915569 env[1292]: time="2024-02-12T19:23:21.915523797Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:23:21.915750 env[1292]: time="2024-02-12T19:23:21.915724557Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:23:21.915851 env[1292]: time="2024-02-12T19:23:21.915828997Z" level=info msg="Daemon has completed initialization" Feb 12 19:23:21.928191 systemd[1]: Started docker.service. Feb 12 19:23:21.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:21.934810 env[1292]: time="2024-02-12T19:23:21.934686237Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:23:21.951868 systemd[1]: Reloading. Feb 12 19:23:21.994836 /usr/lib/systemd/system-generators/torcx-generator[1438]: time="2024-02-12T19:23:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:23:21.994868 /usr/lib/systemd/system-generators/torcx-generator[1438]: time="2024-02-12T19:23:21Z" level=info msg="torcx already run" Feb 12 19:23:22.059536 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:23:22.059636 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:23:22.077831 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit: BPF prog-id=34 op=LOAD Feb 12 19:23:22.124000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit: BPF prog-id=35 op=LOAD Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.124000 audit: BPF prog-id=36 op=LOAD Feb 12 19:23:22.124000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:23:22.124000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.125000 audit: BPF prog-id=37 op=LOAD Feb 12 19:23:22.125000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit: BPF prog-id=38 op=LOAD Feb 12 19:23:22.126000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.126000 audit: BPF prog-id=39 op=LOAD Feb 12 19:23:22.126000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.127000 audit: BPF prog-id=40 op=LOAD Feb 12 19:23:22.127000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit: BPF prog-id=41 op=LOAD Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.128000 audit: BPF prog-id=42 op=LOAD Feb 12 19:23:22.128000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:23:22.128000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit: BPF prog-id=43 op=LOAD Feb 12 19:23:22.129000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit: BPF prog-id=44 op=LOAD Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.129000 audit: BPF prog-id=45 op=LOAD Feb 12 19:23:22.129000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:23:22.129000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit: BPF prog-id=46 op=LOAD Feb 12 19:23:22.131000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit: BPF prog-id=47 op=LOAD Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:22.131000 audit: BPF prog-id=48 op=LOAD Feb 12 19:23:22.131000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:23:22.131000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:23:22.138894 systemd[1]: Started kubelet.service. Feb 12 19:23:22.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:22.282088 kubelet[1475]: E0212 19:23:22.281951 1475 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:23:22.284359 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:23:22.284501 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:23:22.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:23:22.625414 env[1138]: time="2024-02-12T19:23:22.625297077Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 12 19:23:23.322305 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3403912220.mount: Deactivated successfully. Feb 12 19:23:24.813583 env[1138]: time="2024-02-12T19:23:24.813528077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:24.814942 env[1138]: time="2024-02-12T19:23:24.814907637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:24.816413 env[1138]: time="2024-02-12T19:23:24.816364477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:24.818773 env[1138]: time="2024-02-12T19:23:24.818737877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:24.819540 env[1138]: time="2024-02-12T19:23:24.819506917Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb\"" Feb 12 19:23:24.828533 env[1138]: time="2024-02-12T19:23:24.828493717Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 12 19:23:26.794326 env[1138]: time="2024-02-12T19:23:26.794274517Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:26.795999 env[1138]: time="2024-02-12T19:23:26.795966677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:26.800000 env[1138]: time="2024-02-12T19:23:26.799957557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:26.803650 env[1138]: time="2024-02-12T19:23:26.803613677Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:26.804470 env[1138]: time="2024-02-12T19:23:26.804419717Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f\"" Feb 12 19:23:26.814210 env[1138]: time="2024-02-12T19:23:26.814172077Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 12 19:23:28.115218 env[1138]: time="2024-02-12T19:23:28.115169077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:28.122472 env[1138]: time="2024-02-12T19:23:28.120347317Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:28.127463 env[1138]: time="2024-02-12T19:23:28.126047677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:28.130207 env[1138]: time="2024-02-12T19:23:28.130169037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:28.131069 env[1138]: time="2024-02-12T19:23:28.131035837Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663\"" Feb 12 19:23:28.140575 env[1138]: time="2024-02-12T19:23:28.140519677Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:23:29.307426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2383657849.mount: Deactivated successfully. Feb 12 19:23:29.904426 env[1138]: time="2024-02-12T19:23:29.904373997Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:29.906804 env[1138]: time="2024-02-12T19:23:29.906768717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:29.907994 env[1138]: time="2024-02-12T19:23:29.907968077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:29.909107 env[1138]: time="2024-02-12T19:23:29.909083797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:29.909508 env[1138]: time="2024-02-12T19:23:29.909483797Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 12 19:23:29.919814 env[1138]: time="2024-02-12T19:23:29.919776237Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:23:30.341339 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3403616053.mount: Deactivated successfully. Feb 12 19:23:30.346357 env[1138]: time="2024-02-12T19:23:30.346304837Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:30.348178 env[1138]: time="2024-02-12T19:23:30.348130197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:30.350069 env[1138]: time="2024-02-12T19:23:30.350030557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:30.352336 env[1138]: time="2024-02-12T19:23:30.352302717Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:30.353319 env[1138]: time="2024-02-12T19:23:30.352822797Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 19:23:30.363641 env[1138]: time="2024-02-12T19:23:30.363602077Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 12 19:23:31.029405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3431809083.mount: Deactivated successfully. Feb 12 19:23:32.535333 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:23:32.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:32.535527 systemd[1]: Stopped kubelet.service. Feb 12 19:23:32.536110 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 19:23:32.536173 kernel: audit: type=1130 audit(1707765812.534:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:32.537245 systemd[1]: Started kubelet.service. Feb 12 19:23:32.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:32.539700 kernel: audit: type=1131 audit(1707765812.534:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:32.539778 kernel: audit: type=1130 audit(1707765812.536:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:32.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:32.590170 kubelet[1530]: E0212 19:23:32.590115 1530 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:23:32.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:23:32.593783 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:23:32.593911 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:23:32.597465 kernel: audit: type=1131 audit(1707765812.593:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:23:34.050385 env[1138]: time="2024-02-12T19:23:34.050320797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:34.052352 env[1138]: time="2024-02-12T19:23:34.052316437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:34.057617 env[1138]: time="2024-02-12T19:23:34.057564557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:34.060754 env[1138]: time="2024-02-12T19:23:34.060716757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:34.061626 env[1138]: time="2024-02-12T19:23:34.061575357Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Feb 12 19:23:34.070588 env[1138]: time="2024-02-12T19:23:34.070540317Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:23:34.653344 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4231207514.mount: Deactivated successfully. Feb 12 19:23:36.211730 env[1138]: time="2024-02-12T19:23:36.211680997Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:36.217695 env[1138]: time="2024-02-12T19:23:36.217612597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:36.220192 env[1138]: time="2024-02-12T19:23:36.220158197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:36.223577 env[1138]: time="2024-02-12T19:23:36.223530757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:36.224186 env[1138]: time="2024-02-12T19:23:36.224156757Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 12 19:23:41.148151 systemd[1]: Stopped kubelet.service. Feb 12 19:23:41.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:41.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:41.152424 kernel: audit: type=1130 audit(1707765821.147:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:41.152507 kernel: audit: type=1131 audit(1707765821.147:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:41.164642 systemd[1]: Reloading. Feb 12 19:23:41.210008 /usr/lib/systemd/system-generators/torcx-generator[1640]: time="2024-02-12T19:23:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:23:41.210408 /usr/lib/systemd/system-generators/torcx-generator[1640]: time="2024-02-12T19:23:41Z" level=info msg="torcx already run" Feb 12 19:23:41.270405 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:23:41.270425 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:23:41.288013 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.339275 kernel: audit: type=1400 audit(1707765821.334:388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.339334 kernel: audit: type=1400 audit(1707765821.334:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.339357 kernel: audit: type=1400 audit(1707765821.334:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341039 kernel: audit: type=1400 audit(1707765821.334:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342882 kernel: audit: type=1400 audit(1707765821.334:392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344709 kernel: audit: type=1400 audit(1707765821.334:393): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.346525 kernel: audit: type=1400 audit(1707765821.334:394): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348383 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit: BPF prog-id=49 op=LOAD Feb 12 19:23:41.336000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit: BPF prog-id=50 op=LOAD Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.340000 audit: BPF prog-id=51 op=LOAD Feb 12 19:23:41.340000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:23:41.340000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit: BPF prog-id=52 op=LOAD Feb 12 19:23:41.342000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit: BPF prog-id=53 op=LOAD Feb 12 19:23:41.344000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.345000 audit: BPF prog-id=54 op=LOAD Feb 12 19:23:41.345000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:23:41.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.348000 audit: BPF prog-id=55 op=LOAD Feb 12 19:23:41.348000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit: BPF prog-id=56 op=LOAD Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit: BPF prog-id=57 op=LOAD Feb 12 19:23:41.349000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:23:41.349000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit: BPF prog-id=58 op=LOAD Feb 12 19:23:41.350000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit: BPF prog-id=59 op=LOAD Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.350000 audit: BPF prog-id=60 op=LOAD Feb 12 19:23:41.350000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:23:41.350000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit: BPF prog-id=61 op=LOAD Feb 12 19:23:41.352000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit: BPF prog-id=62 op=LOAD Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.352000 audit: BPF prog-id=63 op=LOAD Feb 12 19:23:41.352000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:23:41.352000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:23:41.364576 systemd[1]: Started kubelet.service. Feb 12 19:23:41.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:41.404897 kubelet[1678]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:23:41.404897 kubelet[1678]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:23:41.404897 kubelet[1678]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:23:41.404897 kubelet[1678]: I0212 19:23:41.404867 1678 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:23:41.957031 kubelet[1678]: I0212 19:23:41.956981 1678 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:23:41.957031 kubelet[1678]: I0212 19:23:41.957020 1678 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:23:41.957288 kubelet[1678]: I0212 19:23:41.957259 1678 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:23:41.962450 kubelet[1678]: I0212 19:23:41.962423 1678 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:23:41.962599 kubelet[1678]: E0212 19:23:41.962567 1678 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.87:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.967939 kubelet[1678]: W0212 19:23:41.967905 1678 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:23:41.968883 kubelet[1678]: I0212 19:23:41.968855 1678 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:23:41.969233 kubelet[1678]: I0212 19:23:41.969210 1678 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:23:41.969517 kubelet[1678]: I0212 19:23:41.969492 1678 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:23:41.969747 kubelet[1678]: I0212 19:23:41.969730 1678 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:23:41.969816 kubelet[1678]: I0212 19:23:41.969805 1678 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:23:41.969998 kubelet[1678]: I0212 19:23:41.969983 1678 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:23:41.970314 kubelet[1678]: I0212 19:23:41.970298 1678 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:23:41.970402 kubelet[1678]: I0212 19:23:41.970388 1678 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:23:41.970490 kubelet[1678]: I0212 19:23:41.970478 1678 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:23:41.970553 kubelet[1678]: I0212 19:23:41.970543 1678 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:23:41.971019 kubelet[1678]: W0212 19:23:41.970870 1678 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.971019 kubelet[1678]: E0212 19:23:41.970934 1678 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.971551 kubelet[1678]: W0212 19:23:41.971452 1678 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.971551 kubelet[1678]: E0212 19:23:41.971497 1678 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.972361 kubelet[1678]: I0212 19:23:41.972341 1678 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:23:41.973088 kubelet[1678]: W0212 19:23:41.973061 1678 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:23:41.974710 kubelet[1678]: I0212 19:23:41.974686 1678 server.go:1232] "Started kubelet" Feb 12 19:23:41.975000 audit[1678]: AVC avc: denied { mac_admin } for pid=1678 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.975000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:23:41.975000 audit[1678]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004a1410 a1=4000a26cf0 a2=40004a13e0 a3=25 items=0 ppid=1 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:41.975000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:23:41.975000 audit[1678]: AVC avc: denied { mac_admin } for pid=1678 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:41.975000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:23:41.975000 audit[1678]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008f0220 a1=4000a26d08 a2=40004a14a0 a3=25 items=0 ppid=1 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:41.975000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:23:41.976185 kubelet[1678]: I0212 19:23:41.975778 1678 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:23:41.976185 kubelet[1678]: I0212 19:23:41.975813 1678 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:23:41.976185 kubelet[1678]: I0212 19:23:41.975873 1678 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:23:41.976258 kubelet[1678]: E0212 19:23:41.976167 1678 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b333f78a5a033d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 23, 41, 974643517, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 23, 41, 974643517, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://10.0.0.87:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.87:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:23:41.976412 kubelet[1678]: I0212 19:23:41.975495 1678 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:23:41.976744 kubelet[1678]: E0212 19:23:41.976642 1678 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:23:41.976744 kubelet[1678]: E0212 19:23:41.976683 1678 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:23:41.976744 kubelet[1678]: I0212 19:23:41.976743 1678 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:23:41.977023 kubelet[1678]: I0212 19:23:41.977004 1678 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:23:41.977422 kubelet[1678]: E0212 19:23:41.977401 1678 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:23:41.977491 kubelet[1678]: I0212 19:23:41.977438 1678 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:23:41.977538 kubelet[1678]: I0212 19:23:41.977521 1678 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:23:41.977599 kubelet[1678]: I0212 19:23:41.977581 1678 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:23:41.978491 kubelet[1678]: I0212 19:23:41.978469 1678 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:23:41.978577 kubelet[1678]: W0212 19:23:41.978492 1678 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.978577 kubelet[1678]: E0212 19:23:41.978534 1678 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:41.978000 audit[1690]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:41.978000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc8ffd180 a2=0 a3=1 items=0 ppid=1678 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:41.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:23:41.979913 kubelet[1678]: E0212 19:23:41.979891 1678 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="200ms" Feb 12 19:23:41.979000 audit[1691]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:41.979000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff16cfec0 a2=0 a3=1 items=0 ppid=1678 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:41.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:23:41.985000 audit[1693]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:41.985000 audit[1693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc4327b90 a2=0 a3=1 items=0 ppid=1678 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:41.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:23:41.987000 audit[1695]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:41.987000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe3926110 a2=0 a3=1 items=0 ppid=1678 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:41.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:23:41.999610 kubelet[1678]: I0212 19:23:41.999554 1678 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:23:41.999610 kubelet[1678]: I0212 19:23:41.999582 1678 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:23:41.999610 kubelet[1678]: I0212 19:23:41.999602 1678 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:23:42.000000 audit[1704]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:42.000000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc35ec600 a2=0 a3=1 items=0 ppid=1678 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:23:42.001704 kubelet[1678]: I0212 19:23:42.001678 1678 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:23:42.002000 audit[1706]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:23:42.002000 audit[1706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe7382c10 a2=0 a3=1 items=0 ppid=1678 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:23:42.002000 audit[1707]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:42.002000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd56f380 a2=0 a3=1 items=0 ppid=1678 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:23:42.003026 kubelet[1678]: I0212 19:23:42.002959 1678 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:23:42.003026 kubelet[1678]: I0212 19:23:42.002993 1678 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:23:42.003026 kubelet[1678]: I0212 19:23:42.003016 1678 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:23:42.003103 kubelet[1678]: E0212 19:23:42.003076 1678 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:23:42.003000 audit[1708]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:23:42.003000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1602210 a2=0 a3=1 items=0 ppid=1678 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:23:42.004313 kubelet[1678]: W0212 19:23:42.004057 1678 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:42.004313 kubelet[1678]: E0212 19:23:42.004121 1678 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:42.004000 audit[1709]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:23:42.004000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd6a86df0 a2=0 a3=1 items=0 ppid=1678 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:23:42.005000 audit[1710]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:42.005000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd56abff0 a2=0 a3=1 items=0 ppid=1678 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:23:42.006000 audit[1711]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:23:42.006000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff8f9adf0 a2=0 a3=1 items=0 ppid=1678 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:23:42.006000 audit[1712]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:23:42.006000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6346f50 a2=0 a3=1 items=0 ppid=1678 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:23:42.023172 kubelet[1678]: I0212 19:23:42.023143 1678 policy_none.go:49] "None policy: Start" Feb 12 19:23:42.024034 kubelet[1678]: I0212 19:23:42.024010 1678 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:23:42.024110 kubelet[1678]: I0212 19:23:42.024043 1678 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:23:42.029002 systemd[1]: Created slice kubepods.slice. Feb 12 19:23:42.033560 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:23:42.036244 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:23:42.046439 kubelet[1678]: I0212 19:23:42.046411 1678 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:23:42.045000 audit[1678]: AVC avc: denied { mac_admin } for pid=1678 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:42.045000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:23:42.045000 audit[1678]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ff9710 a1=4000c71a40 a2=4000ff96e0 a3=25 items=0 ppid=1 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:42.045000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:23:42.046876 kubelet[1678]: I0212 19:23:42.046861 1678 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:23:42.047162 kubelet[1678]: I0212 19:23:42.047145 1678 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:23:42.048126 kubelet[1678]: E0212 19:23:42.048102 1678 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 19:23:42.079023 kubelet[1678]: I0212 19:23:42.078994 1678 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:23:42.079406 kubelet[1678]: E0212 19:23:42.079382 1678 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" Feb 12 19:23:42.103655 kubelet[1678]: I0212 19:23:42.103611 1678 topology_manager.go:215] "Topology Admit Handler" podUID="12f38d549abb29dba7b70eb7f02484c8" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 12 19:23:42.104866 kubelet[1678]: I0212 19:23:42.104840 1678 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 12 19:23:42.105926 kubelet[1678]: I0212 19:23:42.105905 1678 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 12 19:23:42.110443 systemd[1]: Created slice kubepods-burstable-pod12f38d549abb29dba7b70eb7f02484c8.slice. Feb 12 19:23:42.120736 systemd[1]: Created slice kubepods-burstable-pod212dcc5e2f08bec92c239ac5786b7e2b.slice. Feb 12 19:23:42.130889 systemd[1]: Created slice kubepods-burstable-podd0325d16aab19669b5fea4b6623890e6.slice. Feb 12 19:23:42.181092 kubelet[1678]: E0212 19:23:42.181058 1678 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="400ms" Feb 12 19:23:42.279552 kubelet[1678]: I0212 19:23:42.279516 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:42.279715 kubelet[1678]: I0212 19:23:42.279701 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:42.279817 kubelet[1678]: I0212 19:23:42.279806 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:42.279894 kubelet[1678]: I0212 19:23:42.279882 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/12f38d549abb29dba7b70eb7f02484c8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"12f38d549abb29dba7b70eb7f02484c8\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:42.279967 kubelet[1678]: I0212 19:23:42.279957 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/12f38d549abb29dba7b70eb7f02484c8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"12f38d549abb29dba7b70eb7f02484c8\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:42.280043 kubelet[1678]: I0212 19:23:42.280032 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/12f38d549abb29dba7b70eb7f02484c8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"12f38d549abb29dba7b70eb7f02484c8\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:42.280129 kubelet[1678]: I0212 19:23:42.280118 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:42.280208 kubelet[1678]: I0212 19:23:42.280198 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:42.280595 kubelet[1678]: I0212 19:23:42.280578 1678 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:23:42.280726 kubelet[1678]: I0212 19:23:42.280701 1678 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:23:42.281034 kubelet[1678]: E0212 19:23:42.281017 1678 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" Feb 12 19:23:42.419259 kubelet[1678]: E0212 19:23:42.419219 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:42.419966 env[1138]: time="2024-02-12T19:23:42.419927077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:12f38d549abb29dba7b70eb7f02484c8,Namespace:kube-system,Attempt:0,}" Feb 12 19:23:42.430226 kubelet[1678]: E0212 19:23:42.430198 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:42.430902 env[1138]: time="2024-02-12T19:23:42.430848237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,}" Feb 12 19:23:42.433060 kubelet[1678]: E0212 19:23:42.433038 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:42.433697 env[1138]: time="2024-02-12T19:23:42.433509157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,}" Feb 12 19:23:42.582890 kubelet[1678]: E0212 19:23:42.582274 1678 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="800ms" Feb 12 19:23:42.683978 kubelet[1678]: I0212 19:23:42.683938 1678 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:23:42.684423 kubelet[1678]: E0212 19:23:42.684397 1678 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" Feb 12 19:23:42.923115 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount396445901.mount: Deactivated successfully. Feb 12 19:23:42.930297 env[1138]: time="2024-02-12T19:23:42.930244317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.931323 env[1138]: time="2024-02-12T19:23:42.931294557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.932271 env[1138]: time="2024-02-12T19:23:42.932244277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.935887 env[1138]: time="2024-02-12T19:23:42.935846037Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.937766 env[1138]: time="2024-02-12T19:23:42.937716197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.939956 env[1138]: time="2024-02-12T19:23:42.939923757Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.942359 env[1138]: time="2024-02-12T19:23:42.942324357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.945166 env[1138]: time="2024-02-12T19:23:42.945124717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.949024 env[1138]: time="2024-02-12T19:23:42.948988437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.950278 env[1138]: time="2024-02-12T19:23:42.950232797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.951109 env[1138]: time="2024-02-12T19:23:42.951078877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.952325 env[1138]: time="2024-02-12T19:23:42.952293757Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:23:42.985411 env[1138]: time="2024-02-12T19:23:42.985312357Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:23:42.985540 env[1138]: time="2024-02-12T19:23:42.985380477Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:23:42.985540 env[1138]: time="2024-02-12T19:23:42.985393197Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:23:42.985710 env[1138]: time="2024-02-12T19:23:42.985676837Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ab06cb0ec200a9eae5c955d5607b214dc098ef62f603fb8417c5cdcd28ec675 pid=1721 runtime=io.containerd.runc.v2 Feb 12 19:23:42.992768 env[1138]: time="2024-02-12T19:23:42.992184557Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:23:42.992768 env[1138]: time="2024-02-12T19:23:42.992219077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:23:42.992768 env[1138]: time="2024-02-12T19:23:42.992229037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:23:42.992768 env[1138]: time="2024-02-12T19:23:42.992471877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3de63eef214d0caceeb7368939afccee7d1c7c2d3cb95ad5295272f01c04f2d6 pid=1747 runtime=io.containerd.runc.v2 Feb 12 19:23:42.992967 env[1138]: time="2024-02-12T19:23:42.990780797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:23:42.992967 env[1138]: time="2024-02-12T19:23:42.990906557Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:23:42.992967 env[1138]: time="2024-02-12T19:23:42.990951677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:23:42.992967 env[1138]: time="2024-02-12T19:23:42.991397797Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a228e0f7e8637ee673b7b2d530f17f078e93f83a6dba8fbe497a451a255ce4c pid=1746 runtime=io.containerd.runc.v2 Feb 12 19:23:43.004065 systemd[1]: Started cri-containerd-3ab06cb0ec200a9eae5c955d5607b214dc098ef62f603fb8417c5cdcd28ec675.scope. Feb 12 19:23:43.008249 systemd[1]: Started cri-containerd-9a228e0f7e8637ee673b7b2d530f17f078e93f83a6dba8fbe497a451a255ce4c.scope. Feb 12 19:23:43.027683 systemd[1]: Started cri-containerd-3de63eef214d0caceeb7368939afccee7d1c7c2d3cb95ad5295272f01c04f2d6.scope. Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.037000 audit: BPF prog-id=64 op=LOAD Feb 12 19:23:43.038000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.038000 audit[1739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1721 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361623036636230656332303061396561653563393535643536303762 Feb 12 19:23:43.038000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.038000 audit[1739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1721 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361623036636230656332303061396561653563393535643536303762 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit: BPF prog-id=65 op=LOAD Feb 12 19:23:43.039000 audit[1739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1721 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361623036636230656332303061396561653563393535643536303762 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit: BPF prog-id=66 op=LOAD Feb 12 19:23:43.039000 audit[1739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1721 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361623036636230656332303061396561653563393535643536303762 Feb 12 19:23:43.039000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:23:43.039000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit: BPF prog-id=67 op=LOAD Feb 12 19:23:43.039000 audit[1739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1721 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361623036636230656332303061396561653563393535643536303762 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit: BPF prog-id=68 op=LOAD Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1746 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323238653066376538363337656536373362376232643533306631 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1746 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323238653066376538363337656536373362376232643533306631 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.040000 audit: BPF prog-id=69 op=LOAD Feb 12 19:23:43.040000 audit[1773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1746 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323238653066376538363337656536373362376232643533306631 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.042000 audit: BPF prog-id=70 op=LOAD Feb 12 19:23:43.042000 audit[1773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1746 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323238653066376538363337656536373362376232643533306631 Feb 12 19:23:43.043000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:23:43.043000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.043000 audit: BPF prog-id=71 op=LOAD Feb 12 19:23:43.043000 audit[1773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1746 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961323238653066376538363337656536373362376232643533306631 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.052000 audit: BPF prog-id=72 op=LOAD Feb 12 19:23:43.052000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.052000 audit[1777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1747 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653633656566323134643063616365656237333638393339616663 Feb 12 19:23:43.052000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.052000 audit[1777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1747 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653633656566323134643063616365656237333638393339616663 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit: BPF prog-id=73 op=LOAD Feb 12 19:23:43.053000 audit[1777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1747 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653633656566323134643063616365656237333638393339616663 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit: BPF prog-id=74 op=LOAD Feb 12 19:23:43.053000 audit[1777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1747 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653633656566323134643063616365656237333638393339616663 Feb 12 19:23:43.053000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:23:43.053000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.053000 audit: BPF prog-id=75 op=LOAD Feb 12 19:23:43.053000 audit[1777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1747 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653633656566323134643063616365656237333638393339616663 Feb 12 19:23:43.077475 env[1138]: time="2024-02-12T19:23:43.077418917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:12f38d549abb29dba7b70eb7f02484c8,Namespace:kube-system,Attempt:0,} returns sandbox id \"3ab06cb0ec200a9eae5c955d5607b214dc098ef62f603fb8417c5cdcd28ec675\"" Feb 12 19:23:43.078550 kubelet[1678]: E0212 19:23:43.078447 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:43.081626 env[1138]: time="2024-02-12T19:23:43.081585317Z" level=info msg="CreateContainer within sandbox \"3ab06cb0ec200a9eae5c955d5607b214dc098ef62f603fb8417c5cdcd28ec675\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:23:43.084798 env[1138]: time="2024-02-12T19:23:43.084760997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:212dcc5e2f08bec92c239ac5786b7e2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"3de63eef214d0caceeb7368939afccee7d1c7c2d3cb95ad5295272f01c04f2d6\"" Feb 12 19:23:43.085227 env[1138]: time="2024-02-12T19:23:43.084937397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:d0325d16aab19669b5fea4b6623890e6,Namespace:kube-system,Attempt:0,} returns sandbox id \"9a228e0f7e8637ee673b7b2d530f17f078e93f83a6dba8fbe497a451a255ce4c\"" Feb 12 19:23:43.085874 kubelet[1678]: E0212 19:23:43.085484 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:43.085874 kubelet[1678]: E0212 19:23:43.085742 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:43.090869 env[1138]: time="2024-02-12T19:23:43.090818677Z" level=info msg="CreateContainer within sandbox \"9a228e0f7e8637ee673b7b2d530f17f078e93f83a6dba8fbe497a451a255ce4c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:23:43.092524 env[1138]: time="2024-02-12T19:23:43.092488157Z" level=info msg="CreateContainer within sandbox \"3de63eef214d0caceeb7368939afccee7d1c7c2d3cb95ad5295272f01c04f2d6\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:23:43.113549 env[1138]: time="2024-02-12T19:23:43.113473517Z" level=info msg="CreateContainer within sandbox \"3ab06cb0ec200a9eae5c955d5607b214dc098ef62f603fb8417c5cdcd28ec675\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6d4d19e2eeddc91b9c6ce65ddffed0de67db8061d04dab8b298bc7703b94c138\"" Feb 12 19:23:43.114741 env[1138]: time="2024-02-12T19:23:43.114703557Z" level=info msg="StartContainer for \"6d4d19e2eeddc91b9c6ce65ddffed0de67db8061d04dab8b298bc7703b94c138\"" Feb 12 19:23:43.118505 env[1138]: time="2024-02-12T19:23:43.118423917Z" level=info msg="CreateContainer within sandbox \"3de63eef214d0caceeb7368939afccee7d1c7c2d3cb95ad5295272f01c04f2d6\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4d4c1d3491090683c287be9a0b738e6d781b53c19adda1882d6d70112adb0cac\"" Feb 12 19:23:43.119170 env[1138]: time="2024-02-12T19:23:43.119125197Z" level=info msg="StartContainer for \"4d4c1d3491090683c287be9a0b738e6d781b53c19adda1882d6d70112adb0cac\"" Feb 12 19:23:43.119784 env[1138]: time="2024-02-12T19:23:43.119734997Z" level=info msg="CreateContainer within sandbox \"9a228e0f7e8637ee673b7b2d530f17f078e93f83a6dba8fbe497a451a255ce4c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a91dcca113c37be321c5521e7bf4b1a35106d9a63d3bba1f3481adc8a4ec5a4c\"" Feb 12 19:23:43.120255 env[1138]: time="2024-02-12T19:23:43.120229677Z" level=info msg="StartContainer for \"a91dcca113c37be321c5521e7bf4b1a35106d9a63d3bba1f3481adc8a4ec5a4c\"" Feb 12 19:23:43.137896 systemd[1]: Started cri-containerd-4d4c1d3491090683c287be9a0b738e6d781b53c19adda1882d6d70112adb0cac.scope. Feb 12 19:23:43.140223 systemd[1]: Started cri-containerd-6d4d19e2eeddc91b9c6ce65ddffed0de67db8061d04dab8b298bc7703b94c138.scope. Feb 12 19:23:43.159615 systemd[1]: Started cri-containerd-a91dcca113c37be321c5521e7bf4b1a35106d9a63d3bba1f3481adc8a4ec5a4c.scope. Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit: BPF prog-id=76 op=LOAD Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1746 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139316463636131313363333762653332316335353231653762663462 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1746 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139316463636131313363333762653332316335353231653762663462 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.200000 audit: BPF prog-id=77 op=LOAD Feb 12 19:23:43.200000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1746 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139316463636131313363333762653332316335353231653762663462 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit: BPF prog-id=78 op=LOAD Feb 12 19:23:43.201000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1746 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139316463636131313363333762653332316335353231653762663462 Feb 12 19:23:43.201000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:23:43.201000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.201000 audit: BPF prog-id=79 op=LOAD Feb 12 19:23:43.201000 audit[1869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1746 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139316463636131313363333762653332316335353231653762663462 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.211000 audit: BPF prog-id=80 op=LOAD Feb 12 19:23:43.211000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.211000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664346431396532656564646339316239633663653635646466666564 Feb 12 19:23:43.211000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.211000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664346431396532656564646339316239633663653635646466666564 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit: BPF prog-id=81 op=LOAD Feb 12 19:23:43.212000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664346431396532656564646339316239633663653635646466666564 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.212000 audit: BPF prog-id=82 op=LOAD Feb 12 19:23:43.212000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664346431396532656564646339316239633663653635646466666564 Feb 12 19:23:43.213000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:23:43.213000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.213000 audit: BPF prog-id=83 op=LOAD Feb 12 19:23:43.213000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664346431396532656564646339316239633663653635646466666564 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.218000 audit: BPF prog-id=84 op=LOAD Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1747 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464346331643334393130393036383363323837626539613062373338 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1747 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464346331643334393130393036383363323837626539613062373338 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit: BPF prog-id=85 op=LOAD Feb 12 19:23:43.219000 audit[1867]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1747 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464346331643334393130393036383363323837626539613062373338 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit: BPF prog-id=86 op=LOAD Feb 12 19:23:43.219000 audit[1867]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1747 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464346331643334393130393036383363323837626539613062373338 Feb 12 19:23:43.219000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:23:43.219000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:43.219000 audit: BPF prog-id=87 op=LOAD Feb 12 19:23:43.219000 audit[1867]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1747 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:43.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464346331643334393130393036383363323837626539613062373338 Feb 12 19:23:43.226724 kubelet[1678]: W0212 19:23:43.226685 1678 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:43.226724 kubelet[1678]: E0212 19:23:43.226725 1678 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused Feb 12 19:23:43.233260 env[1138]: time="2024-02-12T19:23:43.233207637Z" level=info msg="StartContainer for \"a91dcca113c37be321c5521e7bf4b1a35106d9a63d3bba1f3481adc8a4ec5a4c\" returns successfully" Feb 12 19:23:43.267480 env[1138]: time="2024-02-12T19:23:43.264798277Z" level=info msg="StartContainer for \"6d4d19e2eeddc91b9c6ce65ddffed0de67db8061d04dab8b298bc7703b94c138\" returns successfully" Feb 12 19:23:43.267480 env[1138]: time="2024-02-12T19:23:43.267207917Z" level=info msg="StartContainer for \"4d4c1d3491090683c287be9a0b738e6d781b53c19adda1882d6d70112adb0cac\" returns successfully" Feb 12 19:23:43.385289 kubelet[1678]: E0212 19:23:43.385253 1678 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="1.6s" Feb 12 19:23:43.488417 kubelet[1678]: I0212 19:23:43.485977 1678 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:23:43.488417 kubelet[1678]: E0212 19:23:43.486280 1678 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" Feb 12 19:23:44.010194 kubelet[1678]: E0212 19:23:44.010163 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:44.012475 kubelet[1678]: E0212 19:23:44.012443 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:44.015079 kubelet[1678]: E0212 19:23:44.015034 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:45.016887 kubelet[1678]: E0212 19:23:45.016857 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:45.088112 kubelet[1678]: I0212 19:23:45.088082 1678 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:23:45.457000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.457000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4005112f30 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:23:45.457000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.457000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400706c040 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:23:45.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:23:45.458000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.458000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003c720f0 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:23:45.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:23:45.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:23:45.459000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.459000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=48 a1=4003932100 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:23:45.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:23:45.460000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.460000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40033a1ce0 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:23:45.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:23:45.460000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.460000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40053a4c90 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:23:45.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:23:45.568729 kubelet[1678]: I0212 19:23:45.568698 1678 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:23:45.623301 kubelet[1678]: E0212 19:23:45.623187 1678 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b333f78a5a033d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 23, 41, 974643517, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 23, 41, 974643517, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'namespaces "default" not found' (will not retry!) Feb 12 19:23:45.637169 kubelet[1678]: E0212 19:23:45.637053 1678 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Feb 12 19:23:45.700000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.700000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40000f45c0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:45.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:45.700000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:45.700000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000074fc0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:45.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:45.973767 kubelet[1678]: I0212 19:23:45.973720 1678 apiserver.go:52] "Watching apiserver" Feb 12 19:23:45.978148 kubelet[1678]: I0212 19:23:45.978106 1678 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:23:47.351735 kubelet[1678]: E0212 19:23:47.351695 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:48.021281 kubelet[1678]: E0212 19:23:48.021248 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:48.328000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.333644 kernel: kauditd_printk_skb: 581 callbacks suppressed Feb 12 19:23:48.333777 kernel: audit: type=1400 audit(1707765828.328:691): avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.333802 kernel: audit: type=1300 audit(1707765828.328:691): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000df4c80 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.328000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000df4c80 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.339280 kernel: audit: type=1327 audit(1707765828.328:691): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.339380 kernel: audit: type=1400 audit(1707765828.330:692): avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.330000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.341712 kernel: audit: type=1300 audit(1707765828.330:692): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000a759a0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.330000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000a759a0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.347452 kernel: audit: type=1327 audit(1707765828.330:692): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.347510 kernel: audit: type=1400 audit(1707765828.330:693): avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.330000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.330000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f551a0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.353035 kernel: audit: type=1300 audit(1707765828.330:693): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f551a0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.353084 kernel: audit: type=1327 audit(1707765828.330:693): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.330000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.356945 kubelet[1678]: E0212 19:23:48.356907 1678 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:48.358465 kernel: audit: type=1400 audit(1707765828.330:694): avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:23:48.330000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f551e0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.452450 systemd[1]: Reloading. Feb 12 19:23:48.511415 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2024-02-12T19:23:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:23:48.511440 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2024-02-12T19:23:48Z" level=info msg="torcx already run" Feb 12 19:23:48.573607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:23:48.573627 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:23:48.591382 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:23:48.627000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521021 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:23:48.627000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009f7e40 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:23:48.627000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit: BPF prog-id=88 op=LOAD Feb 12 19:23:48.649000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit: BPF prog-id=89 op=LOAD Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.649000 audit: BPF prog-id=90 op=LOAD Feb 12 19:23:48.649000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:23:48.649000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.650000 audit: BPF prog-id=91 op=LOAD Feb 12 19:23:48.650000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit: BPF prog-id=92 op=LOAD Feb 12 19:23:48.651000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.651000 audit: BPF prog-id=93 op=LOAD Feb 12 19:23:48.651000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.652000 audit: BPF prog-id=94 op=LOAD Feb 12 19:23:48.652000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit: BPF prog-id=95 op=LOAD Feb 12 19:23:48.653000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.653000 audit: BPF prog-id=96 op=LOAD Feb 12 19:23:48.653000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit: BPF prog-id=97 op=LOAD Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit: BPF prog-id=98 op=LOAD Feb 12 19:23:48.655000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:23:48.655000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit: BPF prog-id=99 op=LOAD Feb 12 19:23:48.656000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit: BPF prog-id=100 op=LOAD Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit: BPF prog-id=101 op=LOAD Feb 12 19:23:48.656000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:23:48.656000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.656000 audit: BPF prog-id=102 op=LOAD Feb 12 19:23:48.656000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.657000 audit: BPF prog-id=103 op=LOAD Feb 12 19:23:48.657000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.658000 audit: BPF prog-id=104 op=LOAD Feb 12 19:23:48.658000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit: BPF prog-id=105 op=LOAD Feb 12 19:23:48.659000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit: BPF prog-id=106 op=LOAD Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.659000 audit: BPF prog-id=107 op=LOAD Feb 12 19:23:48.659000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:23:48.659000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.660000 audit: BPF prog-id=108 op=LOAD Feb 12 19:23:48.660000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:23:48.671827 systemd[1]: Stopping kubelet.service... Feb 12 19:23:48.697985 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:23:48.698209 systemd[1]: Stopped kubelet.service. Feb 12 19:23:48.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:48.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:48.700195 systemd[1]: Started kubelet.service. Feb 12 19:23:48.766848 kubelet[2016]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:23:48.766848 kubelet[2016]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:23:48.766848 kubelet[2016]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:23:48.767169 kubelet[2016]: I0212 19:23:48.766891 2016 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:23:48.771272 kubelet[2016]: I0212 19:23:48.771233 2016 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:23:48.771272 kubelet[2016]: I0212 19:23:48.771262 2016 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:23:48.771452 kubelet[2016]: I0212 19:23:48.771435 2016 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:23:48.773091 kubelet[2016]: I0212 19:23:48.773063 2016 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:23:48.774121 kubelet[2016]: I0212 19:23:48.774097 2016 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:23:48.781648 kubelet[2016]: W0212 19:23:48.781602 2016 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:23:48.782583 kubelet[2016]: I0212 19:23:48.782546 2016 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:23:48.782801 kubelet[2016]: I0212 19:23:48.782778 2016 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:23:48.782954 kubelet[2016]: I0212 19:23:48.782930 2016 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:23:48.782954 kubelet[2016]: I0212 19:23:48.782952 2016 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:23:48.783069 kubelet[2016]: I0212 19:23:48.782961 2016 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:23:48.783069 kubelet[2016]: I0212 19:23:48.782986 2016 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:23:48.783118 kubelet[2016]: I0212 19:23:48.783071 2016 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:23:48.783118 kubelet[2016]: I0212 19:23:48.783088 2016 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:23:48.783118 kubelet[2016]: I0212 19:23:48.783104 2016 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:23:48.783118 kubelet[2016]: I0212 19:23:48.783117 2016 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:23:48.784786 kubelet[2016]: I0212 19:23:48.784750 2016 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:23:48.785407 kubelet[2016]: I0212 19:23:48.785302 2016 server.go:1232] "Started kubelet" Feb 12 19:23:48.786155 kubelet[2016]: I0212 19:23:48.786134 2016 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:23:48.786487 kubelet[2016]: I0212 19:23:48.786463 2016 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:23:48.786608 kubelet[2016]: I0212 19:23:48.786596 2016 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:23:48.786000 audit[2016]: AVC avc: denied { mac_admin } for pid=2016 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.786000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:23:48.786000 audit[2016]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bf3410 a1=4000666d08 a2=4000bf33e0 a3=25 items=0 ppid=1 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:48.786000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:23:48.786000 audit[2016]: AVC avc: denied { mac_admin } for pid=2016 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.786000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:23:48.786000 audit[2016]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009ee740 a1=4000666d20 a2=4000bf34a0 a3=25 items=0 ppid=1 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:48.786000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:23:48.787163 kubelet[2016]: I0212 19:23:48.786870 2016 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:23:48.787163 kubelet[2016]: I0212 19:23:48.786906 2016 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:23:48.787163 kubelet[2016]: I0212 19:23:48.786928 2016 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:23:48.787762 kubelet[2016]: I0212 19:23:48.787743 2016 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:23:48.789992 kubelet[2016]: I0212 19:23:48.789970 2016 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:23:48.790181 kubelet[2016]: I0212 19:23:48.790165 2016 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:23:48.790395 kubelet[2016]: I0212 19:23:48.790380 2016 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:23:48.812585 kubelet[2016]: E0212 19:23:48.812115 2016 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:23:48.812585 kubelet[2016]: E0212 19:23:48.812153 2016 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:23:48.824107 kubelet[2016]: I0212 19:23:48.824070 2016 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:23:48.829047 kubelet[2016]: I0212 19:23:48.829016 2016 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:23:48.829047 kubelet[2016]: I0212 19:23:48.829049 2016 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:23:48.829204 kubelet[2016]: I0212 19:23:48.829067 2016 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:23:48.829204 kubelet[2016]: E0212 19:23:48.829122 2016 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:23:48.868131 kubelet[2016]: I0212 19:23:48.868017 2016 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:23:48.868131 kubelet[2016]: I0212 19:23:48.868047 2016 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:23:48.868131 kubelet[2016]: I0212 19:23:48.868065 2016 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:23:48.868290 kubelet[2016]: I0212 19:23:48.868211 2016 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:23:48.868290 kubelet[2016]: I0212 19:23:48.868235 2016 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 12 19:23:48.868290 kubelet[2016]: I0212 19:23:48.868242 2016 policy_none.go:49] "None policy: Start" Feb 12 19:23:48.868884 kubelet[2016]: I0212 19:23:48.868866 2016 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:23:48.868975 kubelet[2016]: I0212 19:23:48.868965 2016 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:23:48.869155 kubelet[2016]: I0212 19:23:48.869140 2016 state_mem.go:75] "Updated machine memory state" Feb 12 19:23:48.877390 kubelet[2016]: I0212 19:23:48.877357 2016 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:23:48.876000 audit[2016]: AVC avc: denied { mac_admin } for pid=2016 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:23:48.876000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:23:48.876000 audit[2016]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bf2480 a1=4000fd6498 a2=4000bf2450 a3=25 items=0 ppid=1 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:23:48.876000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:23:48.877809 kubelet[2016]: I0212 19:23:48.877571 2016 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:23:48.882070 kubelet[2016]: I0212 19:23:48.882038 2016 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:23:48.899131 kubelet[2016]: I0212 19:23:48.899096 2016 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:23:48.907340 kubelet[2016]: I0212 19:23:48.907304 2016 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 19:23:48.907470 kubelet[2016]: I0212 19:23:48.907411 2016 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:23:48.929636 kubelet[2016]: I0212 19:23:48.929595 2016 topology_manager.go:215] "Topology Admit Handler" podUID="12f38d549abb29dba7b70eb7f02484c8" podNamespace="kube-system" podName="kube-apiserver-localhost" Feb 12 19:23:48.930007 kubelet[2016]: I0212 19:23:48.929956 2016 topology_manager.go:215] "Topology Admit Handler" podUID="212dcc5e2f08bec92c239ac5786b7e2b" podNamespace="kube-system" podName="kube-controller-manager-localhost" Feb 12 19:23:48.930134 kubelet[2016]: I0212 19:23:48.930118 2016 topology_manager.go:215] "Topology Admit Handler" podUID="d0325d16aab19669b5fea4b6623890e6" podNamespace="kube-system" podName="kube-scheduler-localhost" Feb 12 19:23:48.935618 kubelet[2016]: E0212 19:23:48.935588 2016 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:48.945516 kubelet[2016]: E0212 19:23:48.945478 2016 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:48.992916 kubelet[2016]: I0212 19:23:48.992881 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/12f38d549abb29dba7b70eb7f02484c8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"12f38d549abb29dba7b70eb7f02484c8\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:48.993136 kubelet[2016]: I0212 19:23:48.993124 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:48.993305 kubelet[2016]: I0212 19:23:48.993292 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:48.993419 kubelet[2016]: I0212 19:23:48.993408 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:48.993508 kubelet[2016]: I0212 19:23:48.993497 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/12f38d549abb29dba7b70eb7f02484c8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"12f38d549abb29dba7b70eb7f02484c8\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:48.993637 kubelet[2016]: I0212 19:23:48.993624 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:48.993778 kubelet[2016]: I0212 19:23:48.993766 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/212dcc5e2f08bec92c239ac5786b7e2b-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"212dcc5e2f08bec92c239ac5786b7e2b\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:23:48.993856 kubelet[2016]: I0212 19:23:48.993846 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d0325d16aab19669b5fea4b6623890e6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"d0325d16aab19669b5fea4b6623890e6\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:23:48.993934 kubelet[2016]: I0212 19:23:48.993924 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/12f38d549abb29dba7b70eb7f02484c8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"12f38d549abb29dba7b70eb7f02484c8\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:49.237259 kubelet[2016]: E0212 19:23:49.237168 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:49.246038 kubelet[2016]: E0212 19:23:49.246005 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:49.246191 kubelet[2016]: E0212 19:23:49.246170 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:49.783673 kubelet[2016]: I0212 19:23:49.783628 2016 apiserver.go:52] "Watching apiserver" Feb 12 19:23:49.790669 kubelet[2016]: I0212 19:23:49.790622 2016 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:23:49.842845 kubelet[2016]: E0212 19:23:49.842811 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:49.843128 kubelet[2016]: E0212 19:23:49.843112 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:49.849875 kubelet[2016]: E0212 19:23:49.849845 2016 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:23:49.850375 kubelet[2016]: E0212 19:23:49.850355 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:49.863987 kubelet[2016]: I0212 19:23:49.863951 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.863879827 podCreationTimestamp="2024-02-12 19:23:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:23:49.863398912 +0000 UTC m=+1.159550716" watchObservedRunningTime="2024-02-12 19:23:49.863879827 +0000 UTC m=+1.160031631" Feb 12 19:23:49.880054 kubelet[2016]: I0212 19:23:49.880016 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.879979542 podCreationTimestamp="2024-02-12 19:23:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:23:49.871747386 +0000 UTC m=+1.167899190" watchObservedRunningTime="2024-02-12 19:23:49.879979542 +0000 UTC m=+1.176131306" Feb 12 19:23:50.844006 kubelet[2016]: E0212 19:23:50.843966 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:50.844577 kubelet[2016]: E0212 19:23:50.844544 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:53.065514 kubelet[2016]: E0212 19:23:53.065437 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:53.080495 kubelet[2016]: I0212 19:23:53.080458 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=5.080421923 podCreationTimestamp="2024-02-12 19:23:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:23:49.880322698 +0000 UTC m=+1.176474502" watchObservedRunningTime="2024-02-12 19:23:53.080421923 +0000 UTC m=+4.376573727" Feb 12 19:23:53.647069 sudo[1274]: pam_unix(sudo:session): session closed for user root Feb 12 19:23:53.646000 audit[1274]: USER_END pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:53.648042 kernel: kauditd_printk_skb: 263 callbacks suppressed Feb 12 19:23:53.648109 kernel: audit: type=1106 audit(1707765833.646:945): pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:53.649644 sshd[1269]: pam_unix(sshd:session): session closed for user core Feb 12 19:23:53.647000 audit[1274]: CRED_DISP pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:53.653682 kernel: audit: type=1104 audit(1707765833.647:946): pid=1274 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:23:53.653737 kernel: audit: type=1106 audit(1707765833.650:947): pid=1269 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:53.650000 audit[1269]: USER_END pid=1269 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:53.652850 systemd[1]: sshd@6-10.0.0.87:22-10.0.0.1:34258.service: Deactivated successfully. Feb 12 19:23:53.653938 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:23:53.654148 systemd[1]: session-7.scope: Consumed 6.852s CPU time. Feb 12 19:23:53.654583 systemd-logind[1126]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:23:53.655369 kernel: audit: type=1104 audit(1707765833.650:948): pid=1269 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:53.650000 audit[1269]: CRED_DISP pid=1269 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:23:53.655518 systemd-logind[1126]: Removed session 7. Feb 12 19:23:53.657367 kernel: audit: type=1131 audit(1707765833.652:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.87:22-10.0.0.1:34258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:53.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.87:22-10.0.0.1:34258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:23:53.848758 kubelet[2016]: E0212 19:23:53.848733 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:55.204095 kubelet[2016]: E0212 19:23:55.204062 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:23:55.851536 kubelet[2016]: E0212 19:23:55.851500 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:00.615149 kubelet[2016]: E0212 19:24:00.615109 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:00.881681 kubelet[2016]: I0212 19:24:00.881572 2016 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:24:00.882240 env[1138]: time="2024-02-12T19:24:00.882191892Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:24:00.882533 kubelet[2016]: I0212 19:24:00.882404 2016 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:24:01.651246 kubelet[2016]: I0212 19:24:01.651197 2016 topology_manager.go:215] "Topology Admit Handler" podUID="a95e781c-de26-4077-92a9-a47bff85fe3c" podNamespace="kube-system" podName="kube-proxy-hcccm" Feb 12 19:24:01.656753 systemd[1]: Created slice kubepods-besteffort-poda95e781c_de26_4077_92a9_a47bff85fe3c.slice. Feb 12 19:24:01.683651 kubelet[2016]: I0212 19:24:01.683608 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a95e781c-de26-4077-92a9-a47bff85fe3c-kube-proxy\") pod \"kube-proxy-hcccm\" (UID: \"a95e781c-de26-4077-92a9-a47bff85fe3c\") " pod="kube-system/kube-proxy-hcccm" Feb 12 19:24:01.683820 kubelet[2016]: I0212 19:24:01.683700 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a95e781c-de26-4077-92a9-a47bff85fe3c-xtables-lock\") pod \"kube-proxy-hcccm\" (UID: \"a95e781c-de26-4077-92a9-a47bff85fe3c\") " pod="kube-system/kube-proxy-hcccm" Feb 12 19:24:01.683820 kubelet[2016]: I0212 19:24:01.683725 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a95e781c-de26-4077-92a9-a47bff85fe3c-lib-modules\") pod \"kube-proxy-hcccm\" (UID: \"a95e781c-de26-4077-92a9-a47bff85fe3c\") " pod="kube-system/kube-proxy-hcccm" Feb 12 19:24:01.683820 kubelet[2016]: I0212 19:24:01.683768 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2dcsr\" (UniqueName: \"kubernetes.io/projected/a95e781c-de26-4077-92a9-a47bff85fe3c-kube-api-access-2dcsr\") pod \"kube-proxy-hcccm\" (UID: \"a95e781c-de26-4077-92a9-a47bff85fe3c\") " pod="kube-system/kube-proxy-hcccm" Feb 12 19:24:01.968160 kubelet[2016]: E0212 19:24:01.968009 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:01.968746 env[1138]: time="2024-02-12T19:24:01.968709560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hcccm,Uid:a95e781c-de26-4077-92a9-a47bff85fe3c,Namespace:kube-system,Attempt:0,}" Feb 12 19:24:01.973973 kubelet[2016]: I0212 19:24:01.973937 2016 topology_manager.go:215] "Topology Admit Handler" podUID="d306782c-ac7c-408d-a4ad-2673094f8e79" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-f26k6" Feb 12 19:24:01.984189 systemd[1]: Created slice kubepods-besteffort-podd306782c_ac7c_408d_a4ad_2673094f8e79.slice. Feb 12 19:24:01.994968 env[1138]: time="2024-02-12T19:24:01.994901676Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:01.995109 env[1138]: time="2024-02-12T19:24:01.994945156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:01.995109 env[1138]: time="2024-02-12T19:24:01.994957116Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:01.995205 env[1138]: time="2024-02-12T19:24:01.995121235Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86756061a1f72c501abbf8649869de89374f41f0993e4d1d94aec7478292c962 pid=2111 runtime=io.containerd.runc.v2 Feb 12 19:24:02.010128 systemd[1]: Started cri-containerd-86756061a1f72c501abbf8649869de89374f41f0993e4d1d94aec7478292c962.scope. Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064868 kernel: audit: type=1400 audit(1707765842.059:950): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064930 kernel: audit: type=1400 audit(1707765842.059:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064949 kernel: audit: type=1400 audit(1707765842.059:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066722 kernel: audit: type=1400 audit(1707765842.059:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.070605 kernel: audit: type=1400 audit(1707765842.059:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.070702 kernel: audit: type=1400 audit(1707765842.059:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.074350 kernel: audit: type=1400 audit(1707765842.059:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.074394 kernel: audit: type=1400 audit(1707765842.059:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.078092 kernel: audit: type=1400 audit(1707765842.059:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.080907 kernel: audit: type=1400 audit(1707765842.061:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.061000 audit: BPF prog-id=109 op=LOAD Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373536303631613166373263353031616262663836343938363964 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373536303631613166373263353031616262663836343938363964 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.064000 audit: BPF prog-id=110 op=LOAD Feb 12 19:24:02.064000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373536303631613166373263353031616262663836343938363964 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.066000 audit: BPF prog-id=111 op=LOAD Feb 12 19:24:02.066000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373536303631613166373263353031616262663836343938363964 Feb 12 19:24:02.068000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:24:02.068000 audit: BPF prog-id=110 op=UNLOAD Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.068000 audit: BPF prog-id=112 op=LOAD Feb 12 19:24:02.068000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373536303631613166373263353031616262663836343938363964 Feb 12 19:24:02.085802 kubelet[2016]: I0212 19:24:02.085771 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d306782c-ac7c-408d-a4ad-2673094f8e79-var-lib-calico\") pod \"tigera-operator-55585899bf-f26k6\" (UID: \"d306782c-ac7c-408d-a4ad-2673094f8e79\") " pod="tigera-operator/tigera-operator-55585899bf-f26k6" Feb 12 19:24:02.085901 kubelet[2016]: I0212 19:24:02.085817 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j4hg4\" (UniqueName: \"kubernetes.io/projected/d306782c-ac7c-408d-a4ad-2673094f8e79-kube-api-access-j4hg4\") pod \"tigera-operator-55585899bf-f26k6\" (UID: \"d306782c-ac7c-408d-a4ad-2673094f8e79\") " pod="tigera-operator/tigera-operator-55585899bf-f26k6" Feb 12 19:24:02.088279 env[1138]: time="2024-02-12T19:24:02.088236341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hcccm,Uid:a95e781c-de26-4077-92a9-a47bff85fe3c,Namespace:kube-system,Attempt:0,} returns sandbox id \"86756061a1f72c501abbf8649869de89374f41f0993e4d1d94aec7478292c962\"" Feb 12 19:24:02.089707 kubelet[2016]: E0212 19:24:02.089230 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:02.091759 env[1138]: time="2024-02-12T19:24:02.091718565Z" level=info msg="CreateContainer within sandbox \"86756061a1f72c501abbf8649869de89374f41f0993e4d1d94aec7478292c962\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:24:02.109451 env[1138]: time="2024-02-12T19:24:02.109385767Z" level=info msg="CreateContainer within sandbox \"86756061a1f72c501abbf8649869de89374f41f0993e4d1d94aec7478292c962\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d1d613a4c589243e92e4686d392f80e795217ff60ae6be080599a7f13595f35f\"" Feb 12 19:24:02.110142 env[1138]: time="2024-02-12T19:24:02.110114084Z" level=info msg="StartContainer for \"d1d613a4c589243e92e4686d392f80e795217ff60ae6be080599a7f13595f35f\"" Feb 12 19:24:02.126492 systemd[1]: Started cri-containerd-d1d613a4c589243e92e4686d392f80e795217ff60ae6be080599a7f13595f35f.scope. Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643631336134633538393234336539326534363836643339326638 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.159000 audit: BPF prog-id=113 op=LOAD Feb 12 19:24:02.159000 audit[2152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643631336134633538393234336539326534363836643339326638 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.160000 audit: BPF prog-id=114 op=LOAD Feb 12 19:24:02.160000 audit[2152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643631336134633538393234336539326534363836643339326638 Feb 12 19:24:02.160000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:24:02.161000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.161000 audit: BPF prog-id=115 op=LOAD Feb 12 19:24:02.161000 audit[2152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643631336134633538393234336539326534363836643339326638 Feb 12 19:24:02.180270 env[1138]: time="2024-02-12T19:24:02.180219653Z" level=info msg="StartContainer for \"d1d613a4c589243e92e4686d392f80e795217ff60ae6be080599a7f13595f35f\" returns successfully" Feb 12 19:24:02.290920 env[1138]: time="2024-02-12T19:24:02.290873843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-f26k6,Uid:d306782c-ac7c-408d-a4ad-2673094f8e79,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:24:02.306348 env[1138]: time="2024-02-12T19:24:02.306275295Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:02.306348 env[1138]: time="2024-02-12T19:24:02.306318535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:02.306550 env[1138]: time="2024-02-12T19:24:02.306515654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:02.306821 env[1138]: time="2024-02-12T19:24:02.306775093Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b848a1d9d06045a840f09d0daa569b9eb0880a13dd16cbca90e8856c5df2c43 pid=2208 runtime=io.containerd.runc.v2 Feb 12 19:24:02.314000 audit[2229]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.314000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4c48560 a2=0 a3=ffffb45e36c0 items=0 ppid=2163 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:24:02.315000 audit[2230]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.315000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf113420 a2=0 a3=ffff89ade6c0 items=0 ppid=2163 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:24:02.320000 audit[2236]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.320000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6f2a1c0 a2=0 a3=ffffaf8036c0 items=0 ppid=2163 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:24:02.322442 systemd[1]: Started cri-containerd-6b848a1d9d06045a840f09d0daa569b9eb0880a13dd16cbca90e8856c5df2c43.scope. Feb 12 19:24:02.321000 audit[2235]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.321000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc609ea00 a2=0 a3=ffffbaf0e6c0 items=0 ppid=2163 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:24:02.324000 audit[2240]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.324000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee2426d0 a2=0 a3=ffff8c5496c0 items=0 ppid=2163 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:24:02.325000 audit[2239]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.325000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc26b260 a2=0 a3=ffff9dabd6c0 items=0 ppid=2163 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:24:02.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit: BPF prog-id=116 op=LOAD Feb 12 19:24:02.359000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2208 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383438613164396430363034356138343066303964306461613536 Feb 12 19:24:02.359000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.359000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2208 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383438613164396430363034356138343066303964306461613536 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit: BPF prog-id=117 op=LOAD Feb 12 19:24:02.360000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2208 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383438613164396430363034356138343066303964306461613536 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.360000 audit: BPF prog-id=118 op=LOAD Feb 12 19:24:02.360000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2208 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383438613164396430363034356138343066303964306461613536 Feb 12 19:24:02.361000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:24:02.361000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:02.361000 audit: BPF prog-id=119 op=LOAD Feb 12 19:24:02.361000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2208 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383438613164396430363034356138343066303964306461613536 Feb 12 19:24:02.381925 env[1138]: time="2024-02-12T19:24:02.381877520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-f26k6,Uid:d306782c-ac7c-408d-a4ad-2673094f8e79,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6b848a1d9d06045a840f09d0daa569b9eb0880a13dd16cbca90e8856c5df2c43\"" Feb 12 19:24:02.385419 env[1138]: time="2024-02-12T19:24:02.384033670Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:24:02.413000 audit[2256]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.413000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff629c660 a2=0 a3=ffff855146c0 items=0 ppid=2163 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:24:02.418000 audit[2258]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.418000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdabfa270 a2=0 a3=ffff9ad7d6c0 items=0 ppid=2163 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:24:02.423000 audit[2261]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.423000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc102ff20 a2=0 a3=ffff8fcb86c0 items=0 ppid=2163 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:24:02.424000 audit[2262]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.424000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc55b430 a2=0 a3=ffffb7e7e6c0 items=0 ppid=2163 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:24:02.426000 audit[2264]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.426000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe94b7420 a2=0 a3=ffffa0e7e6c0 items=0 ppid=2163 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:24:02.427000 audit[2265]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.427000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffb633e0 a2=0 a3=ffffbacdb6c0 items=0 ppid=2163 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:24:02.430000 audit[2267]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.430000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff3d3c910 a2=0 a3=ffff905b36c0 items=0 ppid=2163 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:24:02.434000 audit[2270]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.434000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc9968d40 a2=0 a3=ffffb409f6c0 items=0 ppid=2163 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:24:02.435000 audit[2271]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.435000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec5d7f10 a2=0 a3=ffff8bee06c0 items=0 ppid=2163 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:24:02.438401 update_engine[1128]: I0212 19:24:02.438357 1128 update_attempter.cc:509] Updating boot flags... Feb 12 19:24:02.438000 audit[2273]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.438000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5adce30 a2=0 a3=ffff995776c0 items=0 ppid=2163 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:24:02.439000 audit[2275]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.439000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6808e80 a2=0 a3=ffff882d86c0 items=0 ppid=2163 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:24:02.442000 audit[2279]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.442000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffee7c380 a2=0 a3=ffff952a16c0 items=0 ppid=2163 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:24:02.446000 audit[2282]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.446000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffead7c150 a2=0 a3=ffffade2a6c0 items=0 ppid=2163 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:24:02.454000 audit[2285]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.454000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde7c9150 a2=0 a3=ffff8e9266c0 items=0 ppid=2163 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:24:02.458000 audit[2289]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.458000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe579eb40 a2=0 a3=ffff8b26e6c0 items=0 ppid=2163 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:24:02.472000 audit[2297]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.472000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe296e6e0 a2=0 a3=ffffa98656c0 items=0 ppid=2163 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:24:02.477000 audit[2301]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.477000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe916bbb0 a2=0 a3=ffffbf55b6c0 items=0 ppid=2163 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:24:02.478000 audit[2302]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.478000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3297290 a2=0 a3=ffff8bf276c0 items=0 ppid=2163 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:24:02.482000 audit[2304]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:24:02.482000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc8509f80 a2=0 a3=ffffbc6d36c0 items=0 ppid=2163 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:24:02.505000 audit[2310]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:02.505000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd5b8a8f0 a2=0 a3=ffffae74d6c0 items=0 ppid=2163 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:02.519000 audit[2310]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:02.519000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd5b8a8f0 a2=0 a3=ffffae74d6c0 items=0 ppid=2163 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:02.521000 audit[2316]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.521000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff950f890 a2=0 a3=ffff96b1f6c0 items=0 ppid=2163 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:24:02.525000 audit[2318]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.525000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe49f7170 a2=0 a3=ffffbe35a6c0 items=0 ppid=2163 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:24:02.533000 audit[2321]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.533000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe875ef40 a2=0 a3=ffff98eaa6c0 items=0 ppid=2163 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:24:02.535000 audit[2322]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.535000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff954e7c0 a2=0 a3=ffff8925f6c0 items=0 ppid=2163 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:24:02.542000 audit[2325]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.542000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8527790 a2=0 a3=ffffa07726c0 items=0 ppid=2163 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:24:02.543000 audit[2326]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.543000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc5bc980 a2=0 a3=ffffb3ead6c0 items=0 ppid=2163 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:24:02.549000 audit[2328]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.549000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff5005cc0 a2=0 a3=ffff8869e6c0 items=0 ppid=2163 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:24:02.557000 audit[2331]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.557000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffd9b5760 a2=0 a3=ffff8aac06c0 items=0 ppid=2163 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:24:02.558000 audit[2332]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.558000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2982210 a2=0 a3=ffff866146c0 items=0 ppid=2163 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:24:02.561000 audit[2334]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.561000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1de3d70 a2=0 a3=ffff972b46c0 items=0 ppid=2163 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:24:02.562000 audit[2335]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.562000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeacf5dc0 a2=0 a3=ffff9e9c06c0 items=0 ppid=2163 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:24:02.564000 audit[2337]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.564000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc769ffc0 a2=0 a3=ffffbcc7e6c0 items=0 ppid=2163 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:24:02.567000 audit[2340]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.567000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd7b50f0 a2=0 a3=ffff84e096c0 items=0 ppid=2163 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:24:02.570000 audit[2343]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.570000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffac1d650 a2=0 a3=ffff8b10f6c0 items=0 ppid=2163 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:24:02.572000 audit[2344]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.572000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc6f29050 a2=0 a3=ffffb8ddf6c0 items=0 ppid=2163 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:24:02.574000 audit[2346]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.574000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff608c6d0 a2=0 a3=ffff891096c0 items=0 ppid=2163 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:24:02.577000 audit[2349]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.577000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef1332f0 a2=0 a3=ffffba1e06c0 items=0 ppid=2163 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:24:02.578000 audit[2350]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.578000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe289f210 a2=0 a3=ffff9867f6c0 items=0 ppid=2163 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:24:02.580000 audit[2352]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.580000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffccd07ba0 a2=0 a3=ffffbc3a86c0 items=0 ppid=2163 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:24:02.581000 audit[2353]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.581000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed0d8ab0 a2=0 a3=ffff992176c0 items=0 ppid=2163 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:24:02.584000 audit[2355]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.584000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc0a89ee0 a2=0 a3=ffff9d2466c0 items=0 ppid=2163 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:24:02.587000 audit[2358]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:24:02.587000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffde74960 a2=0 a3=ffffaf1e96c0 items=0 ppid=2163 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:24:02.590000 audit[2360]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:24:02.590000 audit[2360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc4ccce80 a2=0 a3=ffff817876c0 items=0 ppid=2163 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.590000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:02.590000 audit[2360]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:24:02.590000 audit[2360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc4ccce80 a2=0 a3=ffff817876c0 items=0 ppid=2163 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:02.590000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:02.800907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount901661752.mount: Deactivated successfully. Feb 12 19:24:02.875019 kubelet[2016]: E0212 19:24:02.874979 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:02.886135 kubelet[2016]: I0212 19:24:02.885186 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-hcccm" podStartSLOduration=1.88514773 podCreationTimestamp="2024-02-12 19:24:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:24:02.884790372 +0000 UTC m=+14.180942176" watchObservedRunningTime="2024-02-12 19:24:02.88514773 +0000 UTC m=+14.181299534" Feb 12 19:24:03.280649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2938883002.mount: Deactivated successfully. Feb 12 19:24:04.084817 env[1138]: time="2024-02-12T19:24:04.084730018Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:04.087631 env[1138]: time="2024-02-12T19:24:04.087585886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:04.090733 env[1138]: time="2024-02-12T19:24:04.090691154Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:04.093223 env[1138]: time="2024-02-12T19:24:04.093171185Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:04.094001 env[1138]: time="2024-02-12T19:24:04.093967302Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 19:24:04.098474 env[1138]: time="2024-02-12T19:24:04.098410444Z" level=info msg="CreateContainer within sandbox \"6b848a1d9d06045a840f09d0daa569b9eb0880a13dd16cbca90e8856c5df2c43\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:24:04.110290 env[1138]: time="2024-02-12T19:24:04.110239118Z" level=info msg="CreateContainer within sandbox \"6b848a1d9d06045a840f09d0daa569b9eb0880a13dd16cbca90e8856c5df2c43\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"06635389335e97407a76a45cd836e161dcc86018e680135917c68a600236531d\"" Feb 12 19:24:04.111191 env[1138]: time="2024-02-12T19:24:04.111162475Z" level=info msg="StartContainer for \"06635389335e97407a76a45cd836e161dcc86018e680135917c68a600236531d\"" Feb 12 19:24:04.127026 systemd[1]: Started cri-containerd-06635389335e97407a76a45cd836e161dcc86018e680135917c68a600236531d.scope. Feb 12 19:24:04.130269 systemd[1]: run-containerd-runc-k8s.io-06635389335e97407a76a45cd836e161dcc86018e680135917c68a600236531d-runc.leSAkH.mount: Deactivated successfully. Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.174000 audit: BPF prog-id=120 op=LOAD Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2208 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:04.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363335333839333335653937343037613736613435636438333665 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2208 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:04.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363335333839333335653937343037613736613435636438333665 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit: BPF prog-id=121 op=LOAD Feb 12 19:24:04.175000 audit[2368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2208 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:04.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363335333839333335653937343037613736613435636438333665 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit: BPF prog-id=122 op=LOAD Feb 12 19:24:04.175000 audit[2368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2208 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:04.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363335333839333335653937343037613736613435636438333665 Feb 12 19:24:04.175000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:24:04.175000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:04.175000 audit: BPF prog-id=123 op=LOAD Feb 12 19:24:04.175000 audit[2368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2208 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:04.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363335333839333335653937343037613736613435636438333665 Feb 12 19:24:04.196812 env[1138]: time="2024-02-12T19:24:04.196754701Z" level=info msg="StartContainer for \"06635389335e97407a76a45cd836e161dcc86018e680135917c68a600236531d\" returns successfully" Feb 12 19:24:08.049000 audit[2401]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.052801 kernel: kauditd_printk_skb: 357 callbacks suppressed Feb 12 19:24:08.052910 kernel: audit: type=1325 audit(1707765848.049:1061): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.052935 kernel: audit: type=1300 audit(1707765848.049:1061): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc63b5d50 a2=0 a3=ffff814b36c0 items=0 ppid=2163 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.049000 audit[2401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc63b5d50 a2=0 a3=ffff814b36c0 items=0 ppid=2163 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.049000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.057123 kernel: audit: type=1327 audit(1707765848.049:1061): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.050000 audit[2401]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.050000 audit[2401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc63b5d50 a2=0 a3=ffff814b36c0 items=0 ppid=2163 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.071396 kernel: audit: type=1325 audit(1707765848.050:1062): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.071488 kernel: audit: type=1300 audit(1707765848.050:1062): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc63b5d50 a2=0 a3=ffff814b36c0 items=0 ppid=2163 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.071513 kernel: audit: type=1327 audit(1707765848.050:1062): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.072000 audit[2403]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.072000 audit[2403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc313e4b0 a2=0 a3=ffff85a286c0 items=0 ppid=2163 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.088249 kernel: audit: type=1325 audit(1707765848.072:1063): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.088351 kernel: audit: type=1300 audit(1707765848.072:1063): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc313e4b0 a2=0 a3=ffff85a286c0 items=0 ppid=2163 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.088380 kernel: audit: type=1327 audit(1707765848.072:1063): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.084000 audit[2403]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.084000 audit[2403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc313e4b0 a2=0 a3=ffff85a286c0 items=0 ppid=2163 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:08.097693 kernel: audit: type=1325 audit(1707765848.084:1064): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:08.176687 kubelet[2016]: I0212 19:24:08.176633 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-f26k6" podStartSLOduration=5.465594134 podCreationTimestamp="2024-02-12 19:24:01 +0000 UTC" firstStartedPulling="2024-02-12 19:24:02.383343073 +0000 UTC m=+13.679494837" lastFinishedPulling="2024-02-12 19:24:04.09434126 +0000 UTC m=+15.390493064" observedRunningTime="2024-02-12 19:24:04.88789681 +0000 UTC m=+16.184048614" watchObservedRunningTime="2024-02-12 19:24:08.176592361 +0000 UTC m=+19.472744165" Feb 12 19:24:08.177611 kubelet[2016]: I0212 19:24:08.177586 2016 topology_manager.go:215] "Topology Admit Handler" podUID="c0c33b87-6b78-4c34-8129-8a1f37946c4e" podNamespace="calico-system" podName="calico-typha-6c9b8f559f-46nlt" Feb 12 19:24:08.183760 systemd[1]: Created slice kubepods-besteffort-podc0c33b87_6b78_4c34_8129_8a1f37946c4e.slice. Feb 12 19:24:08.229406 kubelet[2016]: I0212 19:24:08.229361 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c0c33b87-6b78-4c34-8129-8a1f37946c4e-tigera-ca-bundle\") pod \"calico-typha-6c9b8f559f-46nlt\" (UID: \"c0c33b87-6b78-4c34-8129-8a1f37946c4e\") " pod="calico-system/calico-typha-6c9b8f559f-46nlt" Feb 12 19:24:08.229406 kubelet[2016]: I0212 19:24:08.229407 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c0c33b87-6b78-4c34-8129-8a1f37946c4e-typha-certs\") pod \"calico-typha-6c9b8f559f-46nlt\" (UID: \"c0c33b87-6b78-4c34-8129-8a1f37946c4e\") " pod="calico-system/calico-typha-6c9b8f559f-46nlt" Feb 12 19:24:08.229605 kubelet[2016]: I0212 19:24:08.229432 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4zdxz\" (UniqueName: \"kubernetes.io/projected/c0c33b87-6b78-4c34-8129-8a1f37946c4e-kube-api-access-4zdxz\") pod \"calico-typha-6c9b8f559f-46nlt\" (UID: \"c0c33b87-6b78-4c34-8129-8a1f37946c4e\") " pod="calico-system/calico-typha-6c9b8f559f-46nlt" Feb 12 19:24:08.243265 kubelet[2016]: I0212 19:24:08.243215 2016 topology_manager.go:215] "Topology Admit Handler" podUID="a596d064-9512-4428-a555-c2ecc504819e" podNamespace="calico-system" podName="calico-node-hw8xb" Feb 12 19:24:08.250068 systemd[1]: Created slice kubepods-besteffort-poda596d064_9512_4428_a555_c2ecc504819e.slice. Feb 12 19:24:08.330566 kubelet[2016]: I0212 19:24:08.330458 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-policysync\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.330789 kubelet[2016]: I0212 19:24:08.330774 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-cni-log-dir\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.330879 kubelet[2016]: I0212 19:24:08.330869 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-flexvol-driver-host\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.330974 kubelet[2016]: I0212 19:24:08.330963 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-cni-bin-dir\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331074 kubelet[2016]: I0212 19:24:08.331057 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-xtables-lock\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331153 kubelet[2016]: I0212 19:24:08.331143 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-var-run-calico\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331262 kubelet[2016]: I0212 19:24:08.331249 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-var-lib-calico\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331346 kubelet[2016]: I0212 19:24:08.331335 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-cni-net-dir\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331426 kubelet[2016]: I0212 19:24:08.331416 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a596d064-9512-4428-a555-c2ecc504819e-lib-modules\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331498 kubelet[2016]: I0212 19:24:08.331487 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a596d064-9512-4428-a555-c2ecc504819e-node-certs\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331651 kubelet[2016]: I0212 19:24:08.331637 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-slmkd\" (UniqueName: \"kubernetes.io/projected/a596d064-9512-4428-a555-c2ecc504819e-kube-api-access-slmkd\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.331778 kubelet[2016]: I0212 19:24:08.331765 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a596d064-9512-4428-a555-c2ecc504819e-tigera-ca-bundle\") pod \"calico-node-hw8xb\" (UID: \"a596d064-9512-4428-a555-c2ecc504819e\") " pod="calico-system/calico-node-hw8xb" Feb 12 19:24:08.374548 kubelet[2016]: I0212 19:24:08.374516 2016 topology_manager.go:215] "Topology Admit Handler" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" podNamespace="calico-system" podName="csi-node-driver-b9cl8" Feb 12 19:24:08.375042 kubelet[2016]: E0212 19:24:08.375022 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:08.432354 kubelet[2016]: I0212 19:24:08.432313 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/15798585-dd7e-43ea-940e-23d08ef03b22-kubelet-dir\") pod \"csi-node-driver-b9cl8\" (UID: \"15798585-dd7e-43ea-940e-23d08ef03b22\") " pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:08.432786 kubelet[2016]: I0212 19:24:08.432771 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/15798585-dd7e-43ea-940e-23d08ef03b22-registration-dir\") pod \"csi-node-driver-b9cl8\" (UID: \"15798585-dd7e-43ea-940e-23d08ef03b22\") " pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:08.432964 kubelet[2016]: I0212 19:24:08.432942 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98dqc\" (UniqueName: \"kubernetes.io/projected/15798585-dd7e-43ea-940e-23d08ef03b22-kube-api-access-98dqc\") pod \"csi-node-driver-b9cl8\" (UID: \"15798585-dd7e-43ea-940e-23d08ef03b22\") " pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:08.433343 kubelet[2016]: E0212 19:24:08.433326 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.433408 kubelet[2016]: W0212 19:24:08.433343 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.433408 kubelet[2016]: E0212 19:24:08.433368 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.433586 kubelet[2016]: E0212 19:24:08.433575 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.433586 kubelet[2016]: W0212 19:24:08.433586 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.433688 kubelet[2016]: E0212 19:24:08.433602 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.433822 kubelet[2016]: E0212 19:24:08.433806 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.433822 kubelet[2016]: W0212 19:24:08.433818 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.433890 kubelet[2016]: E0212 19:24:08.433831 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.434081 kubelet[2016]: E0212 19:24:08.434066 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.434081 kubelet[2016]: W0212 19:24:08.434079 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.434181 kubelet[2016]: E0212 19:24:08.434098 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.434468 kubelet[2016]: E0212 19:24:08.434452 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.434468 kubelet[2016]: W0212 19:24:08.434468 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.434559 kubelet[2016]: E0212 19:24:08.434487 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.434766 kubelet[2016]: E0212 19:24:08.434753 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.434826 kubelet[2016]: W0212 19:24:08.434766 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.434826 kubelet[2016]: E0212 19:24:08.434799 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.434883 kubelet[2016]: I0212 19:24:08.434831 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/15798585-dd7e-43ea-940e-23d08ef03b22-socket-dir\") pod \"csi-node-driver-b9cl8\" (UID: \"15798585-dd7e-43ea-940e-23d08ef03b22\") " pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:08.435029 kubelet[2016]: E0212 19:24:08.435017 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.435029 kubelet[2016]: W0212 19:24:08.435029 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.435143 kubelet[2016]: E0212 19:24:08.435126 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.435224 kubelet[2016]: E0212 19:24:08.435180 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.435303 kubelet[2016]: W0212 19:24:08.435287 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.435373 kubelet[2016]: E0212 19:24:08.435363 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.435687 kubelet[2016]: E0212 19:24:08.435655 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.435768 kubelet[2016]: W0212 19:24:08.435754 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.435861 kubelet[2016]: E0212 19:24:08.435850 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.436105 kubelet[2016]: E0212 19:24:08.436093 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.436209 kubelet[2016]: W0212 19:24:08.436195 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.436283 kubelet[2016]: E0212 19:24:08.436272 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.436525 kubelet[2016]: E0212 19:24:08.436513 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.436609 kubelet[2016]: W0212 19:24:08.436597 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.436707 kubelet[2016]: E0212 19:24:08.436687 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.436952 kubelet[2016]: E0212 19:24:08.436938 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.437042 kubelet[2016]: W0212 19:24:08.437028 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.437123 kubelet[2016]: E0212 19:24:08.437111 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.437371 kubelet[2016]: E0212 19:24:08.437358 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.437447 kubelet[2016]: W0212 19:24:08.437435 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.437531 kubelet[2016]: E0212 19:24:08.437519 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.437904 kubelet[2016]: E0212 19:24:08.437890 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.438019 kubelet[2016]: W0212 19:24:08.438005 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.438091 kubelet[2016]: E0212 19:24:08.438081 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.438385 kubelet[2016]: E0212 19:24:08.438370 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.438487 kubelet[2016]: W0212 19:24:08.438470 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.438562 kubelet[2016]: E0212 19:24:08.438553 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.438880 kubelet[2016]: E0212 19:24:08.438867 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.438983 kubelet[2016]: W0212 19:24:08.438969 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.439063 kubelet[2016]: E0212 19:24:08.439054 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.439325 kubelet[2016]: E0212 19:24:08.439312 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.439412 kubelet[2016]: W0212 19:24:08.439399 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.439486 kubelet[2016]: E0212 19:24:08.439476 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.439770 kubelet[2016]: E0212 19:24:08.439756 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.439863 kubelet[2016]: W0212 19:24:08.439849 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.439926 kubelet[2016]: E0212 19:24:08.439917 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.440199 kubelet[2016]: E0212 19:24:08.440184 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.440292 kubelet[2016]: W0212 19:24:08.440278 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.440365 kubelet[2016]: E0212 19:24:08.440355 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.440583 kubelet[2016]: E0212 19:24:08.440570 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.440750 kubelet[2016]: W0212 19:24:08.440734 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.440822 kubelet[2016]: E0212 19:24:08.440812 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.441116 kubelet[2016]: E0212 19:24:08.441100 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.441218 kubelet[2016]: W0212 19:24:08.441204 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.441295 kubelet[2016]: E0212 19:24:08.441284 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.441548 kubelet[2016]: E0212 19:24:08.441526 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.441595 kubelet[2016]: W0212 19:24:08.441551 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.441595 kubelet[2016]: E0212 19:24:08.441573 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.441787 kubelet[2016]: E0212 19:24:08.441775 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.441833 kubelet[2016]: W0212 19:24:08.441787 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443263 kubelet[2016]: E0212 19:24:08.441996 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.443263 kubelet[2016]: I0212 19:24:08.442052 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/15798585-dd7e-43ea-940e-23d08ef03b22-varrun\") pod \"csi-node-driver-b9cl8\" (UID: \"15798585-dd7e-43ea-940e-23d08ef03b22\") " pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:08.443263 kubelet[2016]: E0212 19:24:08.442079 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443263 kubelet[2016]: W0212 19:24:08.442092 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443263 kubelet[2016]: E0212 19:24:08.442118 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.443263 kubelet[2016]: E0212 19:24:08.442283 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443263 kubelet[2016]: W0212 19:24:08.442293 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443263 kubelet[2016]: E0212 19:24:08.442488 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443263 kubelet[2016]: W0212 19:24:08.442498 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443263 kubelet[2016]: E0212 19:24:08.442651 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443555 kubelet[2016]: W0212 19:24:08.442687 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443555 kubelet[2016]: E0212 19:24:08.442858 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443555 kubelet[2016]: W0212 19:24:08.442869 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443555 kubelet[2016]: E0212 19:24:08.443010 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443555 kubelet[2016]: W0212 19:24:08.443019 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443555 kubelet[2016]: E0212 19:24:08.443142 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443555 kubelet[2016]: W0212 19:24:08.443149 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443555 kubelet[2016]: E0212 19:24:08.443162 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.443555 kubelet[2016]: E0212 19:24:08.443312 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443555 kubelet[2016]: W0212 19:24:08.443319 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443919 kubelet[2016]: E0212 19:24:08.443330 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.443919 kubelet[2016]: E0212 19:24:08.443499 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443919 kubelet[2016]: W0212 19:24:08.443506 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443919 kubelet[2016]: E0212 19:24:08.443519 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.443919 kubelet[2016]: E0212 19:24:08.443541 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.443919 kubelet[2016]: E0212 19:24:08.443723 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.443919 kubelet[2016]: W0212 19:24:08.443733 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.443919 kubelet[2016]: E0212 19:24:08.443743 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.444609 kubelet[2016]: E0212 19:24:08.444156 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.444609 kubelet[2016]: E0212 19:24:08.444227 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.444609 kubelet[2016]: E0212 19:24:08.444250 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.444609 kubelet[2016]: E0212 19:24:08.444265 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.444609 kubelet[2016]: E0212 19:24:08.444470 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.444609 kubelet[2016]: W0212 19:24:08.444480 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.444609 kubelet[2016]: E0212 19:24:08.444499 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.445240 kubelet[2016]: E0212 19:24:08.445209 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.445240 kubelet[2016]: W0212 19:24:08.445224 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.445240 kubelet[2016]: E0212 19:24:08.445245 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.445486 kubelet[2016]: E0212 19:24:08.445473 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.445486 kubelet[2016]: W0212 19:24:08.445484 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.445532 kubelet[2016]: E0212 19:24:08.445514 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.445695 kubelet[2016]: E0212 19:24:08.445646 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.445731 kubelet[2016]: W0212 19:24:08.445698 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.445766 kubelet[2016]: E0212 19:24:08.445752 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.447306 kubelet[2016]: E0212 19:24:08.447280 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.447306 kubelet[2016]: W0212 19:24:08.447296 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.447355 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.448810 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.447414 kubelet[2016]: W0212 19:24:08.448824 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.448844 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.449055 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.447414 kubelet[2016]: W0212 19:24:08.449065 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.449080 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.450200 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.447414 kubelet[2016]: W0212 19:24:08.450215 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.447414 kubelet[2016]: E0212 19:24:08.450329 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.450893 kubelet[2016]: E0212 19:24:08.450593 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.450893 kubelet[2016]: W0212 19:24:08.450603 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.450893 kubelet[2016]: E0212 19:24:08.450616 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.463689 kubelet[2016]: E0212 19:24:08.463521 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.463689 kubelet[2016]: W0212 19:24:08.463540 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.463689 kubelet[2016]: E0212 19:24:08.463587 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.489022 kubelet[2016]: E0212 19:24:08.488987 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:08.490052 env[1138]: time="2024-02-12T19:24:08.489559539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c9b8f559f-46nlt,Uid:c0c33b87-6b78-4c34-8129-8a1f37946c4e,Namespace:calico-system,Attempt:0,}" Feb 12 19:24:08.508987 env[1138]: time="2024-02-12T19:24:08.508899761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:08.509141 env[1138]: time="2024-02-12T19:24:08.509005281Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:08.509141 env[1138]: time="2024-02-12T19:24:08.509032841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:08.509219 env[1138]: time="2024-02-12T19:24:08.509193160Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36bf48232890c859fe0d1cbdcf33a8aa0300d9c1c0164500fd5ac6dbb8af2ce4 pid=2458 runtime=io.containerd.runc.v2 Feb 12 19:24:08.529848 systemd[1]: Started cri-containerd-36bf48232890c859fe0d1cbdcf33a8aa0300d9c1c0164500fd5ac6dbb8af2ce4.scope. Feb 12 19:24:08.543135 kubelet[2016]: E0212 19:24:08.543103 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.543135 kubelet[2016]: W0212 19:24:08.543125 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.543321 kubelet[2016]: E0212 19:24:08.543146 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.543460 kubelet[2016]: E0212 19:24:08.543442 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.543460 kubelet[2016]: W0212 19:24:08.543458 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.543542 kubelet[2016]: E0212 19:24:08.543478 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.543736 kubelet[2016]: E0212 19:24:08.543720 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.543736 kubelet[2016]: W0212 19:24:08.543735 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.543838 kubelet[2016]: E0212 19:24:08.543749 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.544003 kubelet[2016]: E0212 19:24:08.543987 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.544003 kubelet[2016]: W0212 19:24:08.544002 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.544091 kubelet[2016]: E0212 19:24:08.544017 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.544833 kubelet[2016]: E0212 19:24:08.544817 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.544833 kubelet[2016]: W0212 19:24:08.544831 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.544927 kubelet[2016]: E0212 19:24:08.544847 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.546864 kubelet[2016]: E0212 19:24:08.546836 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.546935 kubelet[2016]: W0212 19:24:08.546874 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.547084 kubelet[2016]: E0212 19:24:08.547055 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.547084 kubelet[2016]: W0212 19:24:08.547071 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.547185 kubelet[2016]: E0212 19:24:08.547163 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.547222 kubelet[2016]: E0212 19:24:08.547201 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.549030 kubelet[2016]: E0212 19:24:08.549006 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.549030 kubelet[2016]: W0212 19:24:08.549027 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.549256 kubelet[2016]: E0212 19:24:08.549240 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.549316 kubelet[2016]: W0212 19:24:08.549260 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.549316 kubelet[2016]: E0212 19:24:08.549240 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.549316 kubelet[2016]: E0212 19:24:08.549314 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.549437 kubelet[2016]: E0212 19:24:08.549423 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.549437 kubelet[2016]: W0212 19:24:08.549434 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.549511 kubelet[2016]: E0212 19:24:08.549492 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.549649 kubelet[2016]: E0212 19:24:08.549631 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.549649 kubelet[2016]: W0212 19:24:08.549641 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.549737 kubelet[2016]: E0212 19:24:08.549710 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.549801 kubelet[2016]: E0212 19:24:08.549787 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.549801 kubelet[2016]: W0212 19:24:08.549798 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.549868 kubelet[2016]: E0212 19:24:08.549845 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.550102 kubelet[2016]: E0212 19:24:08.550088 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.550145 kubelet[2016]: W0212 19:24:08.550102 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.550145 kubelet[2016]: E0212 19:24:08.550127 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.550315 kubelet[2016]: E0212 19:24:08.550300 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.550315 kubelet[2016]: W0212 19:24:08.550315 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.550391 kubelet[2016]: E0212 19:24:08.550328 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.551053 kubelet[2016]: E0212 19:24:08.551031 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.551130 kubelet[2016]: W0212 19:24:08.551055 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.551130 kubelet[2016]: E0212 19:24:08.551095 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.551273 kubelet[2016]: E0212 19:24:08.551257 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.551273 kubelet[2016]: W0212 19:24:08.551269 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.551351 kubelet[2016]: E0212 19:24:08.551318 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.551754 kubelet[2016]: E0212 19:24:08.551641 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.551754 kubelet[2016]: W0212 19:24:08.551667 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.551754 kubelet[2016]: E0212 19:24:08.551719 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.552036 kubelet[2016]: E0212 19:24:08.552021 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.552036 kubelet[2016]: W0212 19:24:08.552035 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.552238 kubelet[2016]: E0212 19:24:08.552157 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.552238 kubelet[2016]: E0212 19:24:08.552203 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:08.552484 kubelet[2016]: E0212 19:24:08.552371 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.552484 kubelet[2016]: W0212 19:24:08.552395 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.552484 kubelet[2016]: E0212 19:24:08.552430 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.552922 env[1138]: time="2024-02-12T19:24:08.552859269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hw8xb,Uid:a596d064-9512-4428-a555-c2ecc504819e,Namespace:calico-system,Attempt:0,}" Feb 12 19:24:08.554016 kubelet[2016]: E0212 19:24:08.553845 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.554016 kubelet[2016]: W0212 19:24:08.553868 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.554016 kubelet[2016]: E0212 19:24:08.553933 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.554826 kubelet[2016]: E0212 19:24:08.554687 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.554826 kubelet[2016]: W0212 19:24:08.554704 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.554826 kubelet[2016]: E0212 19:24:08.554806 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.555261 kubelet[2016]: E0212 19:24:08.555130 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.555261 kubelet[2016]: W0212 19:24:08.555145 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.555261 kubelet[2016]: E0212 19:24:08.555225 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.555561 kubelet[2016]: E0212 19:24:08.555445 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.555561 kubelet[2016]: W0212 19:24:08.555460 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.555893 kubelet[2016]: E0212 19:24:08.555800 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.555893 kubelet[2016]: W0212 19:24:08.555816 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.555000 audit: BPF prog-id=124 op=LOAD Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2458 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626634383233323839306338353966653064316362646366333361 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2458 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626634383233323839306338353966653064316362646366333361 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit: BPF prog-id=125 op=LOAD Feb 12 19:24:08.556000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2458 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626634383233323839306338353966653064316362646366333361 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.556000 audit: BPF prog-id=126 op=LOAD Feb 12 19:24:08.556000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2458 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626634383233323839306338353966653064316362646366333361 Feb 12 19:24:08.556000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:24:08.556000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.557000 audit: BPF prog-id=127 op=LOAD Feb 12 19:24:08.557000 audit[2469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2458 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626634383233323839306338353966653064316362646366333361 Feb 12 19:24:08.558865 kubelet[2016]: E0212 19:24:08.558111 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.558865 kubelet[2016]: E0212 19:24:08.558159 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.559314 kubelet[2016]: E0212 19:24:08.559019 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.559314 kubelet[2016]: W0212 19:24:08.559037 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.559314 kubelet[2016]: E0212 19:24:08.559057 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.579418 kubelet[2016]: E0212 19:24:08.579384 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:08.579418 kubelet[2016]: W0212 19:24:08.579404 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:08.579418 kubelet[2016]: E0212 19:24:08.579429 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:08.588586 env[1138]: time="2024-02-12T19:24:08.588021603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:08.588586 env[1138]: time="2024-02-12T19:24:08.588077603Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:08.588586 env[1138]: time="2024-02-12T19:24:08.588088963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:08.588915 env[1138]: time="2024-02-12T19:24:08.588502082Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd pid=2523 runtime=io.containerd.runc.v2 Feb 12 19:24:08.598249 env[1138]: time="2024-02-12T19:24:08.598162093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c9b8f559f-46nlt,Uid:c0c33b87-6b78-4c34-8129-8a1f37946c4e,Namespace:calico-system,Attempt:0,} returns sandbox id \"36bf48232890c859fe0d1cbdcf33a8aa0300d9c1c0164500fd5ac6dbb8af2ce4\"" Feb 12 19:24:08.599292 kubelet[2016]: E0212 19:24:08.599255 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:08.604797 env[1138]: time="2024-02-12T19:24:08.604748433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:24:08.614189 systemd[1]: Started cri-containerd-b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd.scope. Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.641000 audit: BPF prog-id=128 op=LOAD Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2523 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234306334303139663537633433393735346430343236396665306431 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2523 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234306334303139663537633433393735346430343236396665306431 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit: BPF prog-id=129 op=LOAD Feb 12 19:24:08.642000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2523 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234306334303139663537633433393735346430343236396665306431 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit: BPF prog-id=130 op=LOAD Feb 12 19:24:08.642000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2523 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234306334303139663537633433393735346430343236396665306431 Feb 12 19:24:08.642000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:24:08.642000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:08.642000 audit: BPF prog-id=131 op=LOAD Feb 12 19:24:08.642000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2523 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:08.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234306334303139663537633433393735346430343236396665306431 Feb 12 19:24:08.659499 env[1138]: time="2024-02-12T19:24:08.659442508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hw8xb,Uid:a596d064-9512-4428-a555-c2ecc504819e,Namespace:calico-system,Attempt:0,} returns sandbox id \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\"" Feb 12 19:24:08.661907 kubelet[2016]: E0212 19:24:08.661828 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:09.100000 audit[2562]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2562 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:09.100000 audit[2562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd69803c0 a2=0 a3=ffff917416c0 items=0 ppid=2163 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:09.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:09.101000 audit[2562]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2562 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:09.101000 audit[2562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd69803c0 a2=0 a3=ffff917416c0 items=0 ppid=2163 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:09.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:09.700323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount118531257.mount: Deactivated successfully. Feb 12 19:24:09.829827 kubelet[2016]: E0212 19:24:09.829771 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:10.864413 env[1138]: time="2024-02-12T19:24:10.864336899Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:10.881159 env[1138]: time="2024-02-12T19:24:10.881098815Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:10.882965 env[1138]: time="2024-02-12T19:24:10.882917650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:10.884513 env[1138]: time="2024-02-12T19:24:10.884474726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:10.885019 env[1138]: time="2024-02-12T19:24:10.884982044Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 19:24:10.886593 env[1138]: time="2024-02-12T19:24:10.886553800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:24:10.894308 env[1138]: time="2024-02-12T19:24:10.894240300Z" level=info msg="CreateContainer within sandbox \"36bf48232890c859fe0d1cbdcf33a8aa0300d9c1c0164500fd5ac6dbb8af2ce4\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:24:10.914740 env[1138]: time="2024-02-12T19:24:10.914685366Z" level=info msg="CreateContainer within sandbox \"36bf48232890c859fe0d1cbdcf33a8aa0300d9c1c0164500fd5ac6dbb8af2ce4\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8a8306dac338c0db91c3a11400e1b1929f73a30510ace464b3882da81d0f8b24\"" Feb 12 19:24:10.916779 env[1138]: time="2024-02-12T19:24:10.915405564Z" level=info msg="StartContainer for \"8a8306dac338c0db91c3a11400e1b1929f73a30510ace464b3882da81d0f8b24\"" Feb 12 19:24:10.932959 systemd[1]: Started cri-containerd-8a8306dac338c0db91c3a11400e1b1929f73a30510ace464b3882da81d0f8b24.scope. Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.980000 audit: BPF prog-id=132 op=LOAD Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2458 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:10.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383330366461633333386330646239316333613131343030653162 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2458 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:10.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383330366461633333386330646239316333613131343030653162 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit: BPF prog-id=133 op=LOAD Feb 12 19:24:10.981000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2458 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:10.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383330366461633333386330646239316333613131343030653162 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit: BPF prog-id=134 op=LOAD Feb 12 19:24:10.981000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2458 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:10.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383330366461633333386330646239316333613131343030653162 Feb 12 19:24:10.981000 audit: BPF prog-id=134 op=UNLOAD Feb 12 19:24:10.981000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:10.981000 audit: BPF prog-id=135 op=LOAD Feb 12 19:24:10.981000 audit[2572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2458 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:10.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861383330366461633333386330646239316333613131343030653162 Feb 12 19:24:11.052871 env[1138]: time="2024-02-12T19:24:11.052806969Z" level=info msg="StartContainer for \"8a8306dac338c0db91c3a11400e1b1929f73a30510ace464b3882da81d0f8b24\" returns successfully" Feb 12 19:24:11.829647 kubelet[2016]: E0212 19:24:11.829601 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:11.898116 kubelet[2016]: E0212 19:24:11.898087 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:11.908878 kubelet[2016]: I0212 19:24:11.908807 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6c9b8f559f-46nlt" podStartSLOduration=1.6275136 podCreationTimestamp="2024-02-12 19:24:08 +0000 UTC" firstStartedPulling="2024-02-12 19:24:08.604148355 +0000 UTC m=+19.900300159" lastFinishedPulling="2024-02-12 19:24:10.885403083 +0000 UTC m=+22.181554887" observedRunningTime="2024-02-12 19:24:11.90786181 +0000 UTC m=+23.204013574" watchObservedRunningTime="2024-02-12 19:24:11.908768328 +0000 UTC m=+23.204920092" Feb 12 19:24:11.940432 kubelet[2016]: E0212 19:24:11.940387 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.940432 kubelet[2016]: W0212 19:24:11.940419 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.940432 kubelet[2016]: E0212 19:24:11.940442 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.940655 kubelet[2016]: E0212 19:24:11.940639 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.940655 kubelet[2016]: W0212 19:24:11.940651 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.940729 kubelet[2016]: E0212 19:24:11.940675 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.940872 kubelet[2016]: E0212 19:24:11.940847 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.940872 kubelet[2016]: W0212 19:24:11.940860 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.940872 kubelet[2016]: E0212 19:24:11.940872 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.941024 kubelet[2016]: E0212 19:24:11.941002 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.941024 kubelet[2016]: W0212 19:24:11.941012 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.941024 kubelet[2016]: E0212 19:24:11.941023 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.941288 kubelet[2016]: E0212 19:24:11.941263 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.941288 kubelet[2016]: W0212 19:24:11.941277 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.941288 kubelet[2016]: E0212 19:24:11.941288 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.941436 kubelet[2016]: E0212 19:24:11.941424 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.941544 kubelet[2016]: W0212 19:24:11.941530 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.941577 kubelet[2016]: E0212 19:24:11.941550 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.941761 kubelet[2016]: E0212 19:24:11.941738 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.941761 kubelet[2016]: W0212 19:24:11.941750 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.941824 kubelet[2016]: E0212 19:24:11.941763 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.941907 kubelet[2016]: E0212 19:24:11.941896 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.941907 kubelet[2016]: W0212 19:24:11.941906 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.941998 kubelet[2016]: E0212 19:24:11.941915 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.942057 kubelet[2016]: E0212 19:24:11.942046 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.942057 kubelet[2016]: W0212 19:24:11.942056 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.942103 kubelet[2016]: E0212 19:24:11.942065 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.942193 kubelet[2016]: E0212 19:24:11.942183 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.942193 kubelet[2016]: W0212 19:24:11.942192 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.942247 kubelet[2016]: E0212 19:24:11.942202 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.942374 kubelet[2016]: E0212 19:24:11.942362 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.942401 kubelet[2016]: W0212 19:24:11.942373 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.942401 kubelet[2016]: E0212 19:24:11.942384 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.942651 kubelet[2016]: E0212 19:24:11.942636 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.942651 kubelet[2016]: W0212 19:24:11.942649 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.942740 kubelet[2016]: E0212 19:24:11.942675 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.942991 kubelet[2016]: E0212 19:24:11.942976 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.942991 kubelet[2016]: W0212 19:24:11.942990 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.943049 kubelet[2016]: E0212 19:24:11.943005 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.943454 kubelet[2016]: E0212 19:24:11.943425 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.943454 kubelet[2016]: W0212 19:24:11.943440 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.943454 kubelet[2016]: E0212 19:24:11.943452 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.943946 kubelet[2016]: E0212 19:24:11.943929 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.943980 kubelet[2016]: W0212 19:24:11.943960 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.943980 kubelet[2016]: E0212 19:24:11.943979 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.984226 kubelet[2016]: E0212 19:24:11.984186 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.984226 kubelet[2016]: W0212 19:24:11.984210 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.984226 kubelet[2016]: E0212 19:24:11.984233 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.984595 kubelet[2016]: E0212 19:24:11.984565 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.984595 kubelet[2016]: W0212 19:24:11.984582 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.984767 kubelet[2016]: E0212 19:24:11.984735 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.984858 kubelet[2016]: E0212 19:24:11.984840 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.984909 kubelet[2016]: W0212 19:24:11.984859 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.984909 kubelet[2016]: E0212 19:24:11.984887 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.985064 kubelet[2016]: E0212 19:24:11.985034 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.985064 kubelet[2016]: W0212 19:24:11.985044 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.985064 kubelet[2016]: E0212 19:24:11.985059 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.985230 kubelet[2016]: E0212 19:24:11.985217 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.985230 kubelet[2016]: W0212 19:24:11.985229 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.985301 kubelet[2016]: E0212 19:24:11.985248 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.985421 kubelet[2016]: E0212 19:24:11.985409 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.985421 kubelet[2016]: W0212 19:24:11.985419 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.985487 kubelet[2016]: E0212 19:24:11.985434 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.985731 kubelet[2016]: E0212 19:24:11.985719 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.985731 kubelet[2016]: W0212 19:24:11.985730 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.985819 kubelet[2016]: E0212 19:24:11.985748 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.985945 kubelet[2016]: E0212 19:24:11.985930 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.985988 kubelet[2016]: W0212 19:24:11.985945 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.985988 kubelet[2016]: E0212 19:24:11.985965 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.986249 kubelet[2016]: E0212 19:24:11.986155 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.986249 kubelet[2016]: W0212 19:24:11.986168 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.986249 kubelet[2016]: E0212 19:24:11.986206 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.986408 kubelet[2016]: E0212 19:24:11.986301 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.986408 kubelet[2016]: W0212 19:24:11.986308 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.986408 kubelet[2016]: E0212 19:24:11.986324 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.986480 kubelet[2016]: E0212 19:24:11.986456 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.986480 kubelet[2016]: W0212 19:24:11.986463 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.986480 kubelet[2016]: E0212 19:24:11.986476 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.986725 kubelet[2016]: E0212 19:24:11.986604 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.986725 kubelet[2016]: W0212 19:24:11.986613 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.986725 kubelet[2016]: E0212 19:24:11.986623 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.987019 kubelet[2016]: E0212 19:24:11.986896 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.987019 kubelet[2016]: W0212 19:24:11.986910 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.987019 kubelet[2016]: E0212 19:24:11.986946 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.987441 kubelet[2016]: E0212 19:24:11.987288 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.987441 kubelet[2016]: W0212 19:24:11.987313 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.987441 kubelet[2016]: E0212 19:24:11.987335 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.988046 kubelet[2016]: E0212 19:24:11.987615 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.988046 kubelet[2016]: W0212 19:24:11.987628 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.988046 kubelet[2016]: E0212 19:24:11.987649 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.988046 kubelet[2016]: E0212 19:24:11.987849 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.988046 kubelet[2016]: W0212 19:24:11.987860 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.988046 kubelet[2016]: E0212 19:24:11.987875 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.988473 kubelet[2016]: E0212 19:24:11.988335 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.988473 kubelet[2016]: W0212 19:24:11.988351 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.988473 kubelet[2016]: E0212 19:24:11.988374 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:11.988723 kubelet[2016]: E0212 19:24:11.988673 2016 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:24:11.988723 kubelet[2016]: W0212 19:24:11.988686 2016 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:24:11.988723 kubelet[2016]: E0212 19:24:11.988700 2016 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:24:12.144479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2164863005.mount: Deactivated successfully. Feb 12 19:24:12.243122 env[1138]: time="2024-02-12T19:24:12.243063057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:12.247983 env[1138]: time="2024-02-12T19:24:12.247932566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:12.250875 env[1138]: time="2024-02-12T19:24:12.250836559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:12.255823 env[1138]: time="2024-02-12T19:24:12.255734587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:12.256532 env[1138]: time="2024-02-12T19:24:12.256503626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:24:12.258795 env[1138]: time="2024-02-12T19:24:12.258758300Z" level=info msg="CreateContainer within sandbox \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:24:12.270556 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292967080.mount: Deactivated successfully. Feb 12 19:24:12.275216 env[1138]: time="2024-02-12T19:24:12.275159902Z" level=info msg="CreateContainer within sandbox \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac\"" Feb 12 19:24:12.275900 env[1138]: time="2024-02-12T19:24:12.275808301Z" level=info msg="StartContainer for \"84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac\"" Feb 12 19:24:12.299606 systemd[1]: Started cri-containerd-84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac.scope. Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2523 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:12.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343130653961646363616631336266623436323562633035623265 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.344000 audit: BPF prog-id=136 op=LOAD Feb 12 19:24:12.344000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2523 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:12.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343130653961646363616631336266623436323562633035623265 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit: BPF prog-id=137 op=LOAD Feb 12 19:24:12.345000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2523 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:12.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343130653961646363616631336266623436323562633035623265 Feb 12 19:24:12.345000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:24:12.345000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:12.345000 audit: BPF prog-id=138 op=LOAD Feb 12 19:24:12.345000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2523 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:12.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343130653961646363616631336266623436323562633035623265 Feb 12 19:24:12.369583 env[1138]: time="2024-02-12T19:24:12.369410763Z" level=info msg="StartContainer for \"84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac\" returns successfully" Feb 12 19:24:12.383915 systemd[1]: cri-containerd-84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac.scope: Deactivated successfully. Feb 12 19:24:12.388000 audit: BPF prog-id=138 op=UNLOAD Feb 12 19:24:12.416639 env[1138]: time="2024-02-12T19:24:12.416517414Z" level=info msg="shim disconnected" id=84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac Feb 12 19:24:12.416639 env[1138]: time="2024-02-12T19:24:12.416568774Z" level=warning msg="cleaning up after shim disconnected" id=84410e9adccaf13bfb4625bc05b2e2b3a3c9fd30f493feed4451862ce27ad6ac namespace=k8s.io Feb 12 19:24:12.416639 env[1138]: time="2024-02-12T19:24:12.416580334Z" level=info msg="cleaning up dead shim" Feb 12 19:24:12.424079 env[1138]: time="2024-02-12T19:24:12.424025156Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:24:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2684 runtime=io.containerd.runc.v2\n" Feb 12 19:24:12.900757 kubelet[2016]: I0212 19:24:12.900730 2016 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:24:12.901818 kubelet[2016]: E0212 19:24:12.901796 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:12.902490 kubelet[2016]: E0212 19:24:12.902469 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:12.903939 env[1138]: time="2024-02-12T19:24:12.903419242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:24:13.829906 kubelet[2016]: E0212 19:24:13.829864 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:13.967848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1481389595.mount: Deactivated successfully. Feb 12 19:24:15.830392 kubelet[2016]: E0212 19:24:15.830005 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:16.893728 env[1138]: time="2024-02-12T19:24:16.893534839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:16.895687 env[1138]: time="2024-02-12T19:24:16.895625115Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:16.897439 env[1138]: time="2024-02-12T19:24:16.897403152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:16.899098 env[1138]: time="2024-02-12T19:24:16.899066189Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:16.899842 env[1138]: time="2024-02-12T19:24:16.899801508Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:24:16.903776 env[1138]: time="2024-02-12T19:24:16.903719021Z" level=info msg="CreateContainer within sandbox \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:24:16.919685 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4269233230.mount: Deactivated successfully. Feb 12 19:24:16.922983 env[1138]: time="2024-02-12T19:24:16.922930906Z" level=info msg="CreateContainer within sandbox \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f\"" Feb 12 19:24:16.923860 env[1138]: time="2024-02-12T19:24:16.923832545Z" level=info msg="StartContainer for \"b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f\"" Feb 12 19:24:16.942642 systemd[1]: Started cri-containerd-b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f.scope. Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978756 kernel: kauditd_printk_skb: 223 callbacks suppressed Feb 12 19:24:16.978831 kernel: audit: type=1400 audit(1707765856.977:1128): avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2523 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:16.983419 kernel: audit: type=1300 audit(1707765856.977:1128): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2523 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:16.983485 kernel: audit: type=1327 audit(1707765856.977:1128): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230373166366163396465343464333534636535623030386331653139 Feb 12 19:24:16.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230373166366163396465343464333534636535623030386331653139 Feb 12 19:24:16.985998 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.987756 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.989463 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.993023 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.993072 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.994848 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.999031 kernel: audit: type=1400 audit(1707765856.977:1129): avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.977000 audit: BPF prog-id=139 op=LOAD Feb 12 19:24:16.977000 audit[2709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2523 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:16.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230373166366163396465343464333534636535623030386331653139 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.978000 audit: BPF prog-id=140 op=LOAD Feb 12 19:24:16.978000 audit[2709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2523 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:16.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230373166366163396465343464333534636535623030386331653139 Feb 12 19:24:16.979000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:24:16.979000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:16.979000 audit: BPF prog-id=141 op=LOAD Feb 12 19:24:16.979000 audit[2709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2523 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:16.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230373166366163396465343464333534636535623030386331653139 Feb 12 19:24:17.033837 env[1138]: time="2024-02-12T19:24:17.033784191Z" level=info msg="StartContainer for \"b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f\" returns successfully" Feb 12 19:24:17.757040 env[1138]: time="2024-02-12T19:24:17.756978494Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:24:17.759085 systemd[1]: cri-containerd-b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f.scope: Deactivated successfully. Feb 12 19:24:17.764000 audit: BPF prog-id=141 op=UNLOAD Feb 12 19:24:17.776545 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f-rootfs.mount: Deactivated successfully. Feb 12 19:24:17.787537 env[1138]: time="2024-02-12T19:24:17.787489923Z" level=info msg="shim disconnected" id=b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f Feb 12 19:24:17.787537 env[1138]: time="2024-02-12T19:24:17.787539083Z" level=warning msg="cleaning up after shim disconnected" id=b071f6ac9de44d354ce5b008c1e19a8c97bd7bed6adb3c7a18002affe135de3f namespace=k8s.io Feb 12 19:24:17.787836 env[1138]: time="2024-02-12T19:24:17.787549283Z" level=info msg="cleaning up dead shim" Feb 12 19:24:17.795199 env[1138]: time="2024-02-12T19:24:17.795150030Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:24:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2758 runtime=io.containerd.runc.v2\n" Feb 12 19:24:17.801402 kubelet[2016]: I0212 19:24:17.801353 2016 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:24:17.821832 kubelet[2016]: I0212 19:24:17.820614 2016 topology_manager.go:215] "Topology Admit Handler" podUID="f15ac41d-c9ad-4a99-ae08-59248eacf9a2" podNamespace="kube-system" podName="coredns-5dd5756b68-fp5wf" Feb 12 19:24:17.821832 kubelet[2016]: I0212 19:24:17.820779 2016 topology_manager.go:215] "Topology Admit Handler" podUID="5f5be533-01e3-42d4-b4c1-ead9830362ea" podNamespace="kube-system" podName="coredns-5dd5756b68-rkzw2" Feb 12 19:24:17.828934 kubelet[2016]: I0212 19:24:17.827676 2016 topology_manager.go:215] "Topology Admit Handler" podUID="46ecd457-275c-45b3-82b5-556c61c68f2a" podNamespace="calico-system" podName="calico-kube-controllers-774b8cdfb9-mckkq" Feb 12 19:24:17.829676 systemd[1]: Created slice kubepods-burstable-pod5f5be533_01e3_42d4_b4c1_ead9830362ea.slice. Feb 12 19:24:17.834819 systemd[1]: Created slice kubepods-burstable-podf15ac41d_c9ad_4a99_ae08_59248eacf9a2.slice. Feb 12 19:24:17.838743 systemd[1]: Created slice kubepods-besteffort-pod46ecd457_275c_45b3_82b5_556c61c68f2a.slice. Feb 12 19:24:17.842526 systemd[1]: Created slice kubepods-besteffort-pod15798585_dd7e_43ea_940e_23d08ef03b22.slice. Feb 12 19:24:17.844534 env[1138]: time="2024-02-12T19:24:17.844480547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b9cl8,Uid:15798585-dd7e-43ea-940e-23d08ef03b22,Namespace:calico-system,Attempt:0,}" Feb 12 19:24:17.911765 kubelet[2016]: E0212 19:24:17.911726 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:17.913175 env[1138]: time="2024-02-12T19:24:17.912366593Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:24:17.929403 kubelet[2016]: I0212 19:24:17.929039 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/46ecd457-275c-45b3-82b5-556c61c68f2a-tigera-ca-bundle\") pod \"calico-kube-controllers-774b8cdfb9-mckkq\" (UID: \"46ecd457-275c-45b3-82b5-556c61c68f2a\") " pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" Feb 12 19:24:17.929403 kubelet[2016]: I0212 19:24:17.929184 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bgs2j\" (UniqueName: \"kubernetes.io/projected/5f5be533-01e3-42d4-b4c1-ead9830362ea-kube-api-access-bgs2j\") pod \"coredns-5dd5756b68-rkzw2\" (UID: \"5f5be533-01e3-42d4-b4c1-ead9830362ea\") " pod="kube-system/coredns-5dd5756b68-rkzw2" Feb 12 19:24:17.929403 kubelet[2016]: I0212 19:24:17.929257 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5f5be533-01e3-42d4-b4c1-ead9830362ea-config-volume\") pod \"coredns-5dd5756b68-rkzw2\" (UID: \"5f5be533-01e3-42d4-b4c1-ead9830362ea\") " pod="kube-system/coredns-5dd5756b68-rkzw2" Feb 12 19:24:17.929403 kubelet[2016]: I0212 19:24:17.929316 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f15ac41d-c9ad-4a99-ae08-59248eacf9a2-config-volume\") pod \"coredns-5dd5756b68-fp5wf\" (UID: \"f15ac41d-c9ad-4a99-ae08-59248eacf9a2\") " pod="kube-system/coredns-5dd5756b68-fp5wf" Feb 12 19:24:17.929403 kubelet[2016]: I0212 19:24:17.929341 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mk999\" (UniqueName: \"kubernetes.io/projected/f15ac41d-c9ad-4a99-ae08-59248eacf9a2-kube-api-access-mk999\") pod \"coredns-5dd5756b68-fp5wf\" (UID: \"f15ac41d-c9ad-4a99-ae08-59248eacf9a2\") " pod="kube-system/coredns-5dd5756b68-fp5wf" Feb 12 19:24:17.929674 kubelet[2016]: I0212 19:24:17.929366 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zst5\" (UniqueName: \"kubernetes.io/projected/46ecd457-275c-45b3-82b5-556c61c68f2a-kube-api-access-5zst5\") pod \"calico-kube-controllers-774b8cdfb9-mckkq\" (UID: \"46ecd457-275c-45b3-82b5-556c61c68f2a\") " pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" Feb 12 19:24:17.929832 env[1138]: time="2024-02-12T19:24:17.929763163Z" level=error msg="Failed to destroy network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:17.931021 env[1138]: time="2024-02-12T19:24:17.930977521Z" level=error msg="encountered an error cleaning up failed sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:17.931171 env[1138]: time="2024-02-12T19:24:17.931138881Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b9cl8,Uid:15798585-dd7e-43ea-940e-23d08ef03b22,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:17.931335 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5-shm.mount: Deactivated successfully. Feb 12 19:24:17.932302 kubelet[2016]: E0212 19:24:17.932269 2016 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:17.932447 kubelet[2016]: E0212 19:24:17.932430 2016 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:17.932479 kubelet[2016]: E0212 19:24:17.932459 2016 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b9cl8" Feb 12 19:24:17.932558 kubelet[2016]: E0212 19:24:17.932534 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-b9cl8_calico-system(15798585-dd7e-43ea-940e-23d08ef03b22)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-b9cl8_calico-system(15798585-dd7e-43ea-940e-23d08ef03b22)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:18.132517 kubelet[2016]: E0212 19:24:18.132473 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:18.133838 env[1138]: time="2024-02-12T19:24:18.133797234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rkzw2,Uid:5f5be533-01e3-42d4-b4c1-ead9830362ea,Namespace:kube-system,Attempt:0,}" Feb 12 19:24:18.136880 kubelet[2016]: E0212 19:24:18.136825 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:18.138972 env[1138]: time="2024-02-12T19:24:18.138926986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fp5wf,Uid:f15ac41d-c9ad-4a99-ae08-59248eacf9a2,Namespace:kube-system,Attempt:0,}" Feb 12 19:24:18.141922 env[1138]: time="2024-02-12T19:24:18.141863941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8cdfb9-mckkq,Uid:46ecd457-275c-45b3-82b5-556c61c68f2a,Namespace:calico-system,Attempt:0,}" Feb 12 19:24:18.304999 env[1138]: time="2024-02-12T19:24:18.304930644Z" level=error msg="Failed to destroy network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.305199 env[1138]: time="2024-02-12T19:24:18.304957124Z" level=error msg="Failed to destroy network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.305492 env[1138]: time="2024-02-12T19:24:18.305432683Z" level=error msg="encountered an error cleaning up failed sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.305541 env[1138]: time="2024-02-12T19:24:18.305515803Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rkzw2,Uid:5f5be533-01e3-42d4-b4c1-ead9830362ea,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.305812 env[1138]: time="2024-02-12T19:24:18.305778323Z" level=error msg="encountered an error cleaning up failed sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.305929 env[1138]: time="2024-02-12T19:24:18.305901162Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8cdfb9-mckkq,Uid:46ecd457-275c-45b3-82b5-556c61c68f2a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.306201 kubelet[2016]: E0212 19:24:18.306176 2016 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.306269 kubelet[2016]: E0212 19:24:18.306235 2016 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" Feb 12 19:24:18.306269 kubelet[2016]: E0212 19:24:18.306255 2016 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" Feb 12 19:24:18.306347 kubelet[2016]: E0212 19:24:18.306302 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-774b8cdfb9-mckkq_calico-system(46ecd457-275c-45b3-82b5-556c61c68f2a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-774b8cdfb9-mckkq_calico-system(46ecd457-275c-45b3-82b5-556c61c68f2a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" podUID="46ecd457-275c-45b3-82b5-556c61c68f2a" Feb 12 19:24:18.308724 kubelet[2016]: E0212 19:24:18.307773 2016 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.308724 kubelet[2016]: E0212 19:24:18.307836 2016 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-rkzw2" Feb 12 19:24:18.308724 kubelet[2016]: E0212 19:24:18.307858 2016 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-rkzw2" Feb 12 19:24:18.308960 kubelet[2016]: E0212 19:24:18.307918 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-rkzw2_kube-system(5f5be533-01e3-42d4-b4c1-ead9830362ea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-rkzw2_kube-system(5f5be533-01e3-42d4-b4c1-ead9830362ea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-rkzw2" podUID="5f5be533-01e3-42d4-b4c1-ead9830362ea" Feb 12 19:24:18.319471 env[1138]: time="2024-02-12T19:24:18.319404541Z" level=error msg="Failed to destroy network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.319821 env[1138]: time="2024-02-12T19:24:18.319780261Z" level=error msg="encountered an error cleaning up failed sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.319870 env[1138]: time="2024-02-12T19:24:18.319834260Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fp5wf,Uid:f15ac41d-c9ad-4a99-ae08-59248eacf9a2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.320470 kubelet[2016]: E0212 19:24:18.320043 2016 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.320470 kubelet[2016]: E0212 19:24:18.320098 2016 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fp5wf" Feb 12 19:24:18.320470 kubelet[2016]: E0212 19:24:18.320179 2016 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fp5wf" Feb 12 19:24:18.320655 kubelet[2016]: E0212 19:24:18.320230 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-fp5wf_kube-system(f15ac41d-c9ad-4a99-ae08-59248eacf9a2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-fp5wf_kube-system(f15ac41d-c9ad-4a99-ae08-59248eacf9a2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fp5wf" podUID="f15ac41d-c9ad-4a99-ae08-59248eacf9a2" Feb 12 19:24:18.914279 kubelet[2016]: I0212 19:24:18.914245 2016 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:18.915004 env[1138]: time="2024-02-12T19:24:18.914968242Z" level=info msg="StopPodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\"" Feb 12 19:24:18.915423 kubelet[2016]: I0212 19:24:18.915388 2016 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:18.919395 env[1138]: time="2024-02-12T19:24:18.915907440Z" level=info msg="StopPodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\"" Feb 12 19:24:18.918323 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03-shm.mount: Deactivated successfully. Feb 12 19:24:18.921535 kubelet[2016]: I0212 19:24:18.921502 2016 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:18.922374 env[1138]: time="2024-02-12T19:24:18.922320550Z" level=info msg="StopPodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\"" Feb 12 19:24:18.923141 kubelet[2016]: I0212 19:24:18.922772 2016 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:18.923488 env[1138]: time="2024-02-12T19:24:18.923448348Z" level=info msg="StopPodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\"" Feb 12 19:24:18.968818 env[1138]: time="2024-02-12T19:24:18.968617957Z" level=error msg="StopPodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" failed" error="failed to destroy network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.969601 kubelet[2016]: E0212 19:24:18.969553 2016 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:18.969721 kubelet[2016]: E0212 19:24:18.969652 2016 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93"} Feb 12 19:24:18.969721 kubelet[2016]: E0212 19:24:18.969706 2016 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46ecd457-275c-45b3-82b5-556c61c68f2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:24:18.969824 kubelet[2016]: E0212 19:24:18.969736 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46ecd457-275c-45b3-82b5-556c61c68f2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" podUID="46ecd457-275c-45b3-82b5-556c61c68f2a" Feb 12 19:24:18.980155 env[1138]: time="2024-02-12T19:24:18.980081859Z" level=error msg="StopPodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" failed" error="failed to destroy network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.980783 kubelet[2016]: E0212 19:24:18.980737 2016 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:18.980890 kubelet[2016]: E0212 19:24:18.980797 2016 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5"} Feb 12 19:24:18.980890 kubelet[2016]: E0212 19:24:18.980851 2016 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f15ac41d-c9ad-4a99-ae08-59248eacf9a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:24:18.980890 kubelet[2016]: E0212 19:24:18.980882 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f15ac41d-c9ad-4a99-ae08-59248eacf9a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fp5wf" podUID="f15ac41d-c9ad-4a99-ae08-59248eacf9a2" Feb 12 19:24:18.982765 env[1138]: time="2024-02-12T19:24:18.982688855Z" level=error msg="StopPodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" failed" error="failed to destroy network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.983004 kubelet[2016]: E0212 19:24:18.982954 2016 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:18.983061 kubelet[2016]: E0212 19:24:18.983012 2016 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03"} Feb 12 19:24:18.983117 kubelet[2016]: E0212 19:24:18.983095 2016 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5f5be533-01e3-42d4-b4c1-ead9830362ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:24:18.983210 kubelet[2016]: E0212 19:24:18.983140 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5f5be533-01e3-42d4-b4c1-ead9830362ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-rkzw2" podUID="5f5be533-01e3-42d4-b4c1-ead9830362ea" Feb 12 19:24:18.987137 env[1138]: time="2024-02-12T19:24:18.987062768Z" level=error msg="StopPodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" failed" error="failed to destroy network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:24:18.987370 kubelet[2016]: E0212 19:24:18.987346 2016 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:18.987434 kubelet[2016]: E0212 19:24:18.987402 2016 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5"} Feb 12 19:24:18.987471 kubelet[2016]: E0212 19:24:18.987434 2016 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"15798585-dd7e-43ea-940e-23d08ef03b22\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:24:18.987528 kubelet[2016]: E0212 19:24:18.987492 2016 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"15798585-dd7e-43ea-940e-23d08ef03b22\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b9cl8" podUID="15798585-dd7e-43ea-940e-23d08ef03b22" Feb 12 19:24:22.390264 systemd[1]: Started sshd@7-10.0.0.87:22-10.0.0.1:33546.service. Feb 12 19:24:22.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.87:22-10.0.0.1:33546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:22.391362 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:24:22.391455 kernel: audit: type=1130 audit(1707765862.389:1135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.87:22-10.0.0.1:33546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:22.439000 audit[3023]: USER_ACCT pid=3023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.440570 sshd[3023]: Accepted publickey for core from 10.0.0.1 port 33546 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:22.443697 kernel: audit: type=1101 audit(1707765862.439:1136): pid=3023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.443000 audit[3023]: CRED_ACQ pid=3023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.444822 sshd[3023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:22.448023 kernel: audit: type=1103 audit(1707765862.443:1137): pid=3023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.448120 kernel: audit: type=1006 audit(1707765862.443:1138): pid=3023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 12 19:24:22.448145 kernel: audit: type=1300 audit(1707765862.443:1138): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcda68d10 a2=3 a3=1 items=0 ppid=1 pid=3023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:22.443000 audit[3023]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcda68d10 a2=3 a3=1 items=0 ppid=1 pid=3023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:22.450579 systemd-logind[1126]: New session 8 of user core. Feb 12 19:24:22.451172 kernel: audit: type=1327 audit(1707765862.443:1138): proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:22.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:22.451106 systemd[1]: Started session-8.scope. Feb 12 19:24:22.455000 audit[3023]: USER_START pid=3023 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.461416 kernel: audit: type=1105 audit(1707765862.455:1139): pid=3023 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.461490 kernel: audit: type=1103 audit(1707765862.456:1140): pid=3025 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.456000 audit[3025]: CRED_ACQ pid=3025 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.633626 sshd[3023]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:22.639302 kernel: audit: type=1106 audit(1707765862.633:1141): pid=3023 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.639389 kernel: audit: type=1104 audit(1707765862.633:1142): pid=3023 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.633000 audit[3023]: USER_END pid=3023 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.633000 audit[3023]: CRED_DISP pid=3023 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:22.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.87:22-10.0.0.1:33546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:22.636435 systemd[1]: sshd@7-10.0.0.87:22-10.0.0.1:33546.service: Deactivated successfully. Feb 12 19:24:22.637208 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:24:22.638136 systemd-logind[1126]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:24:22.638925 systemd-logind[1126]: Removed session 8. Feb 12 19:24:22.694762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1800958769.mount: Deactivated successfully. Feb 12 19:24:23.180807 env[1138]: time="2024-02-12T19:24:23.180755477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:23.182199 env[1138]: time="2024-02-12T19:24:23.182162515Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:23.183732 env[1138]: time="2024-02-12T19:24:23.183690074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:23.185352 env[1138]: time="2024-02-12T19:24:23.185311392Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:23.186047 env[1138]: time="2024-02-12T19:24:23.186004151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:24:23.201288 env[1138]: time="2024-02-12T19:24:23.201240054Z" level=info msg="CreateContainer within sandbox \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:24:23.292020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3937791517.mount: Deactivated successfully. Feb 12 19:24:23.431513 env[1138]: time="2024-02-12T19:24:23.431376271Z" level=info msg="CreateContainer within sandbox \"b40c4019f57c439754d04269fe0d1ae7a1ed853b1a2d13f35a5ba396d1542dfd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a1091d1510b5ee441e5c03ed86dc7d141d92bc1bbaaf27a9e41684b66bdb4d48\"" Feb 12 19:24:23.432043 env[1138]: time="2024-02-12T19:24:23.432013790Z" level=info msg="StartContainer for \"a1091d1510b5ee441e5c03ed86dc7d141d92bc1bbaaf27a9e41684b66bdb4d48\"" Feb 12 19:24:23.449068 systemd[1]: Started cri-containerd-a1091d1510b5ee441e5c03ed86dc7d141d92bc1bbaaf27a9e41684b66bdb4d48.scope. Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2523 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:23.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303931643135313062356565343431653563303365643836646337 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.482000 audit: BPF prog-id=142 op=LOAD Feb 12 19:24:23.482000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2523 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:23.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303931643135313062356565343431653563303365643836646337 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.483000 audit: BPF prog-id=143 op=LOAD Feb 12 19:24:23.483000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2523 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:23.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303931643135313062356565343431653563303365643836646337 Feb 12 19:24:23.484000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:24:23.484000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:23.484000 audit: BPF prog-id=144 op=LOAD Feb 12 19:24:23.484000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2523 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:23.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131303931643135313062356565343431653563303365643836646337 Feb 12 19:24:23.518988 env[1138]: time="2024-02-12T19:24:23.518928051Z" level=info msg="StartContainer for \"a1091d1510b5ee441e5c03ed86dc7d141d92bc1bbaaf27a9e41684b66bdb4d48\" returns successfully" Feb 12 19:24:23.664271 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:24:23.664409 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:24:23.935802 kubelet[2016]: E0212 19:24:23.935767 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:23.951783 kubelet[2016]: I0212 19:24:23.951166 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hw8xb" podStartSLOduration=1.429357979 podCreationTimestamp="2024-02-12 19:24:08 +0000 UTC" firstStartedPulling="2024-02-12 19:24:08.664525093 +0000 UTC m=+19.960676897" lastFinishedPulling="2024-02-12 19:24:23.186290471 +0000 UTC m=+34.482442275" observedRunningTime="2024-02-12 19:24:23.950716837 +0000 UTC m=+35.246868641" watchObservedRunningTime="2024-02-12 19:24:23.951123357 +0000 UTC m=+35.247275161" Feb 12 19:24:24.936236 kubelet[2016]: I0212 19:24:24.936195 2016 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:24:24.937048 kubelet[2016]: E0212 19:24:24.937014 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:25.070000 audit[3167]: AVC avc: denied { write } for pid=3167 comm="tee" name="fd" dev="proc" ino=18018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.070000 audit[3167]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1ab298b a2=241 a3=1b6 items=1 ppid=3114 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.070000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:24:25.070000 audit: PATH item=0 name="/dev/fd/63" inode=18706 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:25.071000 audit[3166]: AVC avc: denied { write } for pid=3166 comm="tee" name="fd" dev="proc" ino=19750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.071000 audit[3166]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffffa1d98d a2=241 a3=1b6 items=1 ppid=3116 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.071000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:24:25.071000 audit: PATH item=0 name="/dev/fd/63" inode=18013 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.071000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:25.080000 audit[3175]: AVC avc: denied { write } for pid=3175 comm="tee" name="fd" dev="proc" ino=19758 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.080000 audit[3175]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdbe8f98b a2=241 a3=1b6 items=1 ppid=3123 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.080000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:24:25.080000 audit: PATH item=0 name="/dev/fd/63" inode=20662 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:25.100000 audit[3180]: AVC avc: denied { write } for pid=3180 comm="tee" name="fd" dev="proc" ino=19764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.100000 audit[3180]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe8b0b97b a2=241 a3=1b6 items=1 ppid=3125 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.100000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:24:25.100000 audit: PATH item=0 name="/dev/fd/63" inode=20663 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:25.103000 audit[3189]: AVC avc: denied { write } for pid=3189 comm="tee" name="fd" dev="proc" ino=20667 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.103000 audit[3189]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdcc3598b a2=241 a3=1b6 items=1 ppid=3122 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.103000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:24:25.103000 audit: PATH item=0 name="/dev/fd/63" inode=18028 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:25.108000 audit[3185]: AVC avc: denied { write } for pid=3185 comm="tee" name="fd" dev="proc" ino=20671 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.108000 audit[3185]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3b3f97c a2=241 a3=1b6 items=1 ppid=3113 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.108000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:24:25.108000 audit: PATH item=0 name="/dev/fd/63" inode=18027 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.108000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:25.111000 audit[3186]: AVC avc: denied { write } for pid=3186 comm="tee" name="fd" dev="proc" ino=19769 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:24:25.111000 audit[3186]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff623d98c a2=241 a3=1b6 items=1 ppid=3130 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:25.111000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:24:25.111000 audit: PATH item=0 name="/dev/fd/63" inode=20664 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:24:25.111000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:24:26.264554 kubelet[2016]: I0212 19:24:26.264506 2016 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:24:26.265271 kubelet[2016]: E0212 19:24:26.265204 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:26.307000 audit[3238]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:26.307000 audit[3238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff8267ea0 a2=0 a3=ffffb36cd6c0 items=0 ppid=2163 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:26.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:26.307000 audit[3238]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:26.307000 audit[3238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=fffff8267ea0 a2=0 a3=ffffb36cd6c0 items=0 ppid=2163 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:26.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:26.940364 kubelet[2016]: E0212 19:24:26.940317 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:27.522780 kernel: kauditd_printk_skb: 85 callbacks suppressed Feb 12 19:24:27.523123 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.526987 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.527101 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.531327 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.531553 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.536134 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.536528 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.542821 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.543026 kernel: audit: type=1400 audit(1707765867.519:1159): avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.543172 kernel: audit: type=1334 audit(1707765867.519:1159): prog-id=145 op=LOAD Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit: BPF prog-id=145 op=LOAD Feb 12 19:24:27.519000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe05888f8 a2=70 a3=0 items=0 ppid=3256 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.519000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:24:27.519000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.519000 audit: BPF prog-id=146 op=LOAD Feb 12 19:24:27.519000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe05888f8 a2=70 a3=4a174c items=0 ppid=3256 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.519000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:24:27.520000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe0588928 a2=70 a3=1e90879f items=0 ppid=3256 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.520000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { perfmon } for pid=3326 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit[3326]: AVC avc: denied { bpf } for pid=3326 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.520000 audit: BPF prog-id=147 op=LOAD Feb 12 19:24:27.520000 audit[3326]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe0588878 a2=70 a3=1e9087b9 items=0 ppid=3256 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.520000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:24:27.526000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.526000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc9c15608 a2=70 a3=0 items=0 ppid=3256 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:24:27.526000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:27.526000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc9c154e8 a2=70 a3=2 items=0 ppid=3256 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:24:27.536000 audit: BPF prog-id=147 op=UNLOAD Feb 12 19:24:27.591000 audit[3358]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:27.591000 audit[3358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffffd284010 a2=0 a3=ffff8f770fa8 items=0 ppid=3256 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.591000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:27.597000 audit[3359]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:27.597000 audit[3359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffcc917e60 a2=0 a3=ffffb26fffa8 items=0 ppid=3256 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.597000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:27.603000 audit[3363]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:27.603000 audit[3363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffe939acc0 a2=0 a3=ffff8d39bfa8 items=0 ppid=3256 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.603000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:27.604000 audit[3360]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3360 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:27.604000 audit[3360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd48f6460 a2=0 a3=ffff9e3c3fa8 items=0 ppid=3256 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.604000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:27.639693 systemd[1]: Started sshd@8-10.0.0.87:22-10.0.0.1:44274.service. Feb 12 19:24:27.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.87:22-10.0.0.1:44274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:27.682000 audit[3367]: USER_ACCT pid=3367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:27.683532 sshd[3367]: Accepted publickey for core from 10.0.0.1 port 44274 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:27.685000 audit[3367]: CRED_ACQ pid=3367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:27.685000 audit[3367]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5c90670 a2=3 a3=1 items=0 ppid=1 pid=3367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:27.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:27.694468 sshd[3367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:27.699789 systemd-logind[1126]: New session 9 of user core. Feb 12 19:24:27.700936 systemd[1]: Started session-9.scope. Feb 12 19:24:27.704000 audit[3367]: USER_START pid=3367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:27.705000 audit[3369]: CRED_ACQ pid=3369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:27.841234 sshd[3367]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:27.841000 audit[3367]: USER_END pid=3367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:27.841000 audit[3367]: CRED_DISP pid=3367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:27.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.87:22-10.0.0.1:44274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:27.843783 systemd[1]: sshd@8-10.0.0.87:22-10.0.0.1:44274.service: Deactivated successfully. Feb 12 19:24:27.844740 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:24:27.845544 systemd-logind[1126]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:24:27.846164 systemd-logind[1126]: Removed session 9. Feb 12 19:24:28.427980 systemd-networkd[1045]: vxlan.calico: Link UP Feb 12 19:24:28.427986 systemd-networkd[1045]: vxlan.calico: Gained carrier Feb 12 19:24:29.830273 env[1138]: time="2024-02-12T19:24:29.830223891Z" level=info msg="StopPodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\"" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:29.927 [INFO][3403] k8s.go 578: Cleaning up netns ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:29.928 [INFO][3403] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" iface="eth0" netns="/var/run/netns/cni-8ac97c24-2037-7917-cc28-144faaedd9e2" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:29.929 [INFO][3403] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" iface="eth0" netns="/var/run/netns/cni-8ac97c24-2037-7917-cc28-144faaedd9e2" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:29.932 [INFO][3403] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" iface="eth0" netns="/var/run/netns/cni-8ac97c24-2037-7917-cc28-144faaedd9e2" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:29.932 [INFO][3403] k8s.go 585: Releasing IP address(es) ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:29.932 [INFO][3403] utils.go 188: Calico CNI releasing IP address ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.107 [INFO][3411] ipam_plugin.go 415: Releasing address using handleID ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.108 [INFO][3411] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.108 [INFO][3411] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.120 [WARNING][3411] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.120 [INFO][3411] ipam_plugin.go 443: Releasing address using workloadID ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.127 [INFO][3411] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:30.133614 env[1138]: 2024-02-12 19:24:30.129 [INFO][3403] k8s.go 591: Teardown processing complete. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:30.133614 env[1138]: time="2024-02-12T19:24:30.131567703Z" level=info msg="TearDown network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" successfully" Feb 12 19:24:30.133614 env[1138]: time="2024-02-12T19:24:30.131604103Z" level=info msg="StopPodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" returns successfully" Feb 12 19:24:30.133276 systemd[1]: run-netns-cni\x2d8ac97c24\x2d2037\x2d7917\x2dcc28\x2d144faaedd9e2.mount: Deactivated successfully. Feb 12 19:24:30.134449 kubelet[2016]: E0212 19:24:30.134161 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:30.137783 env[1138]: time="2024-02-12T19:24:30.137739659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fp5wf,Uid:f15ac41d-c9ad-4a99-ae08-59248eacf9a2,Namespace:kube-system,Attempt:1,}" Feb 12 19:24:30.305049 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:24:30.305241 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali880f4731d9c: link becomes ready Feb 12 19:24:30.300744 systemd-networkd[1045]: cali880f4731d9c: Link UP Feb 12 19:24:30.302294 systemd-networkd[1045]: cali880f4731d9c: Gained carrier Feb 12 19:24:30.311792 systemd-networkd[1045]: vxlan.calico: Gained IPv6LL Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.207 [INFO][3418] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--fp5wf-eth0 coredns-5dd5756b68- kube-system f15ac41d-c9ad-4a99-ae08-59248eacf9a2 793 0 2024-02-12 19:24:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-fp5wf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali880f4731d9c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.208 [INFO][3418] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.235 [INFO][3433] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" HandleID="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.249 [INFO][3433] ipam_plugin.go 268: Auto assigning IP ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" HandleID="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029dab0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-fp5wf", "timestamp":"2024-02-12 19:24:30.235604707 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.250 [INFO][3433] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.250 [INFO][3433] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.250 [INFO][3433] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.253 [INFO][3433] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.271 [INFO][3433] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.276 [INFO][3433] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.280 [INFO][3433] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.282 [INFO][3433] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.282 [INFO][3433] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.284 [INFO][3433] ipam.go 1682: Creating new handle: k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23 Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.288 [INFO][3433] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.294 [INFO][3433] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.294 [INFO][3433] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" host="localhost" Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.294 [INFO][3433] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:30.319167 env[1138]: 2024-02-12 19:24:30.294 [INFO][3433] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" HandleID="k8s-pod-network.3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.319949 env[1138]: 2024-02-12 19:24:30.297 [INFO][3418] k8s.go 385: Populated endpoint ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--fp5wf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f15ac41d-c9ad-4a99-ae08-59248eacf9a2", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-fp5wf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali880f4731d9c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:30.319949 env[1138]: 2024-02-12 19:24:30.297 [INFO][3418] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.319949 env[1138]: 2024-02-12 19:24:30.297 [INFO][3418] dataplane_linux.go 68: Setting the host side veth name to cali880f4731d9c ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.319949 env[1138]: 2024-02-12 19:24:30.302 [INFO][3418] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.319949 env[1138]: 2024-02-12 19:24:30.302 [INFO][3418] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--fp5wf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f15ac41d-c9ad-4a99-ae08-59248eacf9a2", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23", Pod:"coredns-5dd5756b68-fp5wf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali880f4731d9c", MAC:"32:4b:0b:01:e8:90", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:30.319949 env[1138]: 2024-02-12 19:24:30.312 [INFO][3418] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23" Namespace="kube-system" Pod="coredns-5dd5756b68-fp5wf" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:30.332000 audit[3457]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3457 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:30.332000 audit[3457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffd878ddf0 a2=0 a3=ffffaeaa2fa8 items=0 ppid=3256 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:30.336223 env[1138]: time="2024-02-12T19:24:30.336152314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:30.336387 env[1138]: time="2024-02-12T19:24:30.336362594Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:30.336492 env[1138]: time="2024-02-12T19:24:30.336470434Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:30.336795 env[1138]: time="2024-02-12T19:24:30.336761474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23 pid=3466 runtime=io.containerd.runc.v2 Feb 12 19:24:30.351290 systemd[1]: Started cri-containerd-3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23.scope. Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.369000 audit: BPF prog-id=148 op=LOAD Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3466 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623537353466623666346361313830616433656630373832346135 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3466 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623537353466623666346361313830616433656630373832346135 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit: BPF prog-id=149 op=LOAD Feb 12 19:24:30.370000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3466 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623537353466623666346361313830616433656630373832346135 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit: BPF prog-id=150 op=LOAD Feb 12 19:24:30.370000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3466 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623537353466623666346361313830616433656630373832346135 Feb 12 19:24:30.370000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:24:30.370000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { perfmon } for pid=3476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit[3476]: AVC avc: denied { bpf } for pid=3476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.370000 audit: BPF prog-id=151 op=LOAD Feb 12 19:24:30.370000 audit[3476]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3466 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365623537353466623666346361313830616433656630373832346135 Feb 12 19:24:30.371885 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:24:30.392713 env[1138]: time="2024-02-12T19:24:30.389763435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fp5wf,Uid:f15ac41d-c9ad-4a99-ae08-59248eacf9a2,Namespace:kube-system,Attempt:1,} returns sandbox id \"3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23\"" Feb 12 19:24:30.393700 kubelet[2016]: E0212 19:24:30.393673 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:30.397174 env[1138]: time="2024-02-12T19:24:30.396363231Z" level=info msg="CreateContainer within sandbox \"3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:24:30.412077 env[1138]: time="2024-02-12T19:24:30.412015019Z" level=info msg="CreateContainer within sandbox \"3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8824cd94dad37dc2f1c9a4e5ff9d5981cb377e6569431c1797ef01669a1fddb9\"" Feb 12 19:24:30.412772 env[1138]: time="2024-02-12T19:24:30.412744539Z" level=info msg="StartContainer for \"8824cd94dad37dc2f1c9a4e5ff9d5981cb377e6569431c1797ef01669a1fddb9\"" Feb 12 19:24:30.427000 systemd[1]: Started cri-containerd-8824cd94dad37dc2f1c9a4e5ff9d5981cb377e6569431c1797ef01669a1fddb9.scope. Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.457000 audit: BPF prog-id=152 op=LOAD Feb 12 19:24:30.457000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.457000 audit[3506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3466 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838323463643934646164333764633266316339613465356666396435 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3466 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838323463643934646164333764633266316339613465356666396435 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit: BPF prog-id=153 op=LOAD Feb 12 19:24:30.458000 audit[3506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3466 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838323463643934646164333764633266316339613465356666396435 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit: BPF prog-id=154 op=LOAD Feb 12 19:24:30.458000 audit[3506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3466 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838323463643934646164333764633266316339613465356666396435 Feb 12 19:24:30.458000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:24:30.458000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:30.458000 audit: BPF prog-id=155 op=LOAD Feb 12 19:24:30.458000 audit[3506]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3466 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838323463643934646164333764633266316339613465356666396435 Feb 12 19:24:30.481485 env[1138]: time="2024-02-12T19:24:30.481420169Z" level=info msg="StartContainer for \"8824cd94dad37dc2f1c9a4e5ff9d5981cb377e6569431c1797ef01669a1fddb9\" returns successfully" Feb 12 19:24:30.949835 kubelet[2016]: E0212 19:24:30.949788 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:30.962696 kubelet[2016]: I0212 19:24:30.962626 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-fp5wf" podStartSLOduration=29.962590819 podCreationTimestamp="2024-02-12 19:24:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:24:30.96155018 +0000 UTC m=+42.257701944" watchObservedRunningTime="2024-02-12 19:24:30.962590819 +0000 UTC m=+42.258742623" Feb 12 19:24:30.975000 audit[3537]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:30.975000 audit[3537]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffefd26770 a2=0 a3=ffff9f01e6c0 items=0 ppid=2163 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:30.976000 audit[3537]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:30.976000 audit[3537]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffefd26770 a2=0 a3=ffff9f01e6c0 items=0 ppid=2163 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:30.991000 audit[3539]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=3539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:30.991000 audit[3539]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffca5333a0 a2=0 a3=ffff861d16c0 items=0 ppid=2163 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:30.993000 audit[3539]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:30.993000 audit[3539]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffca5333a0 a2=0 a3=ffff861d16c0 items=0 ppid=2163 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:30.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:31.134088 systemd[1]: run-containerd-runc-k8s.io-3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23-runc.KqEqdD.mount: Deactivated successfully. Feb 12 19:24:31.780785 systemd-networkd[1045]: cali880f4731d9c: Gained IPv6LL Feb 12 19:24:31.830797 env[1138]: time="2024-02-12T19:24:31.830754665Z" level=info msg="StopPodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\"" Feb 12 19:24:31.831219 env[1138]: time="2024-02-12T19:24:31.831184265Z" level=info msg="StopPodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\"" Feb 12 19:24:31.952455 kubelet[2016]: E0212 19:24:31.952424 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.891 [INFO][3580] k8s.go 578: Cleaning up netns ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.892 [INFO][3580] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" iface="eth0" netns="/var/run/netns/cni-06e3439f-8d53-c92a-af10-4edf86ffe6d0" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.892 [INFO][3580] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" iface="eth0" netns="/var/run/netns/cni-06e3439f-8d53-c92a-af10-4edf86ffe6d0" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.892 [INFO][3580] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" iface="eth0" netns="/var/run/netns/cni-06e3439f-8d53-c92a-af10-4edf86ffe6d0" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.892 [INFO][3580] k8s.go 585: Releasing IP address(es) ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.892 [INFO][3580] utils.go 188: Calico CNI releasing IP address ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.934 [INFO][3589] ipam_plugin.go 415: Releasing address using handleID ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.935 [INFO][3589] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.935 [INFO][3589] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.946 [WARNING][3589] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.946 [INFO][3589] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.949 [INFO][3589] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:31.959397 env[1138]: 2024-02-12 19:24:31.955 [INFO][3580] k8s.go 591: Teardown processing complete. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:31.961604 systemd[1]: run-netns-cni\x2d06e3439f\x2d8d53\x2dc92a\x2daf10\x2d4edf86ffe6d0.mount: Deactivated successfully. Feb 12 19:24:31.961886 env[1138]: time="2024-02-12T19:24:31.961594576Z" level=info msg="TearDown network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" successfully" Feb 12 19:24:31.961886 env[1138]: time="2024-02-12T19:24:31.961638936Z" level=info msg="StopPodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" returns successfully" Feb 12 19:24:31.962989 env[1138]: time="2024-02-12T19:24:31.962914335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b9cl8,Uid:15798585-dd7e-43ea-940e-23d08ef03b22,Namespace:calico-system,Attempt:1,}" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.904 [INFO][3571] k8s.go 578: Cleaning up netns ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.905 [INFO][3571] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" iface="eth0" netns="/var/run/netns/cni-0dfd51c0-14ae-3d98-23aa-30ed31e26c0a" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.906 [INFO][3571] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" iface="eth0" netns="/var/run/netns/cni-0dfd51c0-14ae-3d98-23aa-30ed31e26c0a" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.906 [INFO][3571] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" iface="eth0" netns="/var/run/netns/cni-0dfd51c0-14ae-3d98-23aa-30ed31e26c0a" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.907 [INFO][3571] k8s.go 585: Releasing IP address(es) ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.907 [INFO][3571] utils.go 188: Calico CNI releasing IP address ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.953 [INFO][3594] ipam_plugin.go 415: Releasing address using handleID ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.954 [INFO][3594] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.954 [INFO][3594] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.968 [WARNING][3594] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.968 [INFO][3594] ipam_plugin.go 443: Releasing address using workloadID ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.970 [INFO][3594] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:31.974498 env[1138]: 2024-02-12 19:24:31.972 [INFO][3571] k8s.go 591: Teardown processing complete. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:31.975122 env[1138]: time="2024-02-12T19:24:31.974651407Z" level=info msg="TearDown network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" successfully" Feb 12 19:24:31.975122 env[1138]: time="2024-02-12T19:24:31.974706927Z" level=info msg="StopPodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" returns successfully" Feb 12 19:24:31.975190 kubelet[2016]: E0212 19:24:31.975016 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:31.975564 env[1138]: time="2024-02-12T19:24:31.975526007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rkzw2,Uid:5f5be533-01e3-42d4-b4c1-ead9830362ea,Namespace:kube-system,Attempt:1,}" Feb 12 19:24:31.977090 systemd[1]: run-netns-cni\x2d0dfd51c0\x2d14ae\x2d3d98\x2d23aa\x2d30ed31e26c0a.mount: Deactivated successfully. Feb 12 19:24:32.127438 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:24:32.127611 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali47a1ce5e709: link becomes ready Feb 12 19:24:32.127654 systemd-networkd[1045]: cali47a1ce5e709: Link UP Feb 12 19:24:32.129253 systemd-networkd[1045]: cali47a1ce5e709: Gained carrier Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.042 [INFO][3603] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--b9cl8-eth0 csi-node-driver- calico-system 15798585-dd7e-43ea-940e-23d08ef03b22 821 0 2024-02-12 19:24:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-b9cl8 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali47a1ce5e709 [] []}} ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.043 [INFO][3603] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.070 [INFO][3631] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" HandleID="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.088 [INFO][3631] ipam_plugin.go 268: Auto assigning IP ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" HandleID="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c380), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-b9cl8", "timestamp":"2024-02-12 19:24:32.070595105 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.088 [INFO][3631] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.088 [INFO][3631] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.089 [INFO][3631] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.093 [INFO][3631] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.100 [INFO][3631] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.105 [INFO][3631] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.107 [INFO][3631] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.109 [INFO][3631] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.110 [INFO][3631] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.111 [INFO][3631] ipam.go 1682: Creating new handle: k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.116 [INFO][3631] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.121 [INFO][3631] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.122 [INFO][3631] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" host="localhost" Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.122 [INFO][3631] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:32.150213 env[1138]: 2024-02-12 19:24:32.122 [INFO][3631] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" HandleID="k8s-pod-network.8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.150910 env[1138]: 2024-02-12 19:24:32.124 [INFO][3603] k8s.go 385: Populated endpoint ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b9cl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15798585-dd7e-43ea-940e-23d08ef03b22", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-b9cl8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47a1ce5e709", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:32.150910 env[1138]: 2024-02-12 19:24:32.124 [INFO][3603] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.150910 env[1138]: 2024-02-12 19:24:32.124 [INFO][3603] dataplane_linux.go 68: Setting the host side veth name to cali47a1ce5e709 ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.150910 env[1138]: 2024-02-12 19:24:32.127 [INFO][3603] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.150910 env[1138]: 2024-02-12 19:24:32.128 [INFO][3603] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b9cl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15798585-dd7e-43ea-940e-23d08ef03b22", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed", Pod:"csi-node-driver-b9cl8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47a1ce5e709", MAC:"b6:7c:e1:fd:3e:16", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:32.150910 env[1138]: 2024-02-12 19:24:32.141 [INFO][3603] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed" Namespace="calico-system" Pod="csi-node-driver-b9cl8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:32.158000 audit[3663]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=3663 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:32.158000 audit[3663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffdc978020 a2=0 a3=ffffb3e39fa8 items=0 ppid=3256 pid=3663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.158000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:32.167930 env[1138]: time="2024-02-12T19:24:32.167014483Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:32.167930 env[1138]: time="2024-02-12T19:24:32.167079363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:32.167930 env[1138]: time="2024-02-12T19:24:32.167090363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:32.167930 env[1138]: time="2024-02-12T19:24:32.167294043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed pid=3672 runtime=io.containerd.runc.v2 Feb 12 19:24:32.182066 systemd-networkd[1045]: cali23319e6ad54: Link UP Feb 12 19:24:32.183682 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali23319e6ad54: link becomes ready Feb 12 19:24:32.183804 systemd-networkd[1045]: cali23319e6ad54: Gained carrier Feb 12 19:24:32.187995 systemd[1]: Started cri-containerd-8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed.scope. Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.046 [INFO][3610] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--rkzw2-eth0 coredns-5dd5756b68- kube-system 5f5be533-01e3-42d4-b4c1-ead9830362ea 822 0 2024-02-12 19:24:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-rkzw2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali23319e6ad54 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.046 [INFO][3610] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.082 [INFO][3635] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" HandleID="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.100 [INFO][3635] ipam_plugin.go 268: Auto assigning IP ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" HandleID="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b1ce0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-rkzw2", "timestamp":"2024-02-12 19:24:32.082522137 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.100 [INFO][3635] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.122 [INFO][3635] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.122 [INFO][3635] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.124 [INFO][3635] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.136 [INFO][3635] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.157 [INFO][3635] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.159 [INFO][3635] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.162 [INFO][3635] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.162 [INFO][3635] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.164 [INFO][3635] ipam.go 1682: Creating new handle: k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004 Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.168 [INFO][3635] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.175 [INFO][3635] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.175 [INFO][3635] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" host="localhost" Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.175 [INFO][3635] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:32.208981 env[1138]: 2024-02-12 19:24:32.175 [INFO][3635] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" HandleID="k8s-pod-network.5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.209922 env[1138]: 2024-02-12 19:24:32.178 [INFO][3610] k8s.go 385: Populated endpoint ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--rkzw2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5f5be533-01e3-42d4-b4c1-ead9830362ea", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-rkzw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali23319e6ad54", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:32.209922 env[1138]: 2024-02-12 19:24:32.178 [INFO][3610] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.209922 env[1138]: 2024-02-12 19:24:32.178 [INFO][3610] dataplane_linux.go 68: Setting the host side veth name to cali23319e6ad54 ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.209922 env[1138]: 2024-02-12 19:24:32.185 [INFO][3610] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.209922 env[1138]: 2024-02-12 19:24:32.191 [INFO][3610] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--rkzw2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5f5be533-01e3-42d4-b4c1-ead9830362ea", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004", Pod:"coredns-5dd5756b68-rkzw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali23319e6ad54", MAC:"a2:a6:d8:de:e6:3f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:32.209922 env[1138]: 2024-02-12 19:24:32.206 [INFO][3610] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004" Namespace="kube-system" Pod="coredns-5dd5756b68-rkzw2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:32.217000 audit[3703]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3703 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:32.217000 audit[3703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17900 a0=3 a1=fffffaf08150 a2=0 a3=ffffb9619fa8 items=0 ppid=3256 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.217000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit: BPF prog-id=156 op=LOAD Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3672 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383665646464636637633663373065613038313038663565666665 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3672 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383665646464636637633663373065613038313038663565666665 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit: BPF prog-id=157 op=LOAD Feb 12 19:24:32.238000 audit[3683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3672 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383665646464636637633663373065613038313038663565666665 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit: BPF prog-id=158 op=LOAD Feb 12 19:24:32.238000 audit[3683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3672 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383665646464636637633663373065613038313038663565666665 Feb 12 19:24:32.238000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:24:32.238000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { perfmon } for pid=3683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit[3683]: AVC avc: denied { bpf } for pid=3683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.238000 audit: BPF prog-id=159 op=LOAD Feb 12 19:24:32.238000 audit[3683]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3672 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383665646464636637633663373065613038313038663565666665 Feb 12 19:24:32.240108 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:24:32.248989 env[1138]: time="2024-02-12T19:24:32.248934911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b9cl8,Uid:15798585-dd7e-43ea-940e-23d08ef03b22,Namespace:calico-system,Attempt:1,} returns sandbox id \"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed\"" Feb 12 19:24:32.250563 env[1138]: time="2024-02-12T19:24:32.250533590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:24:32.258546 env[1138]: time="2024-02-12T19:24:32.258042785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:32.258546 env[1138]: time="2024-02-12T19:24:32.258097985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:32.258546 env[1138]: time="2024-02-12T19:24:32.258107865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:32.258546 env[1138]: time="2024-02-12T19:24:32.258245465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004 pid=3728 runtime=io.containerd.runc.v2 Feb 12 19:24:32.272564 systemd[1]: Started cri-containerd-5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004.scope. Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.289000 audit: BPF prog-id=160 op=LOAD Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3728 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373864366565633963663963636637313064613039646531656563 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3728 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373864366565633963663963636637313064613039646531656563 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit: BPF prog-id=161 op=LOAD Feb 12 19:24:32.290000 audit[3738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3728 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373864366565633963663963636637313064613039646531656563 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit: BPF prog-id=162 op=LOAD Feb 12 19:24:32.290000 audit[3738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3728 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373864366565633963663963636637313064613039646531656563 Feb 12 19:24:32.290000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:24:32.290000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.290000 audit: BPF prog-id=163 op=LOAD Feb 12 19:24:32.290000 audit[3738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3728 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373864366565633963663963636637313064613039646531656563 Feb 12 19:24:32.291892 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:24:32.310017 env[1138]: time="2024-02-12T19:24:32.308910392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rkzw2,Uid:5f5be533-01e3-42d4-b4c1-ead9830362ea,Namespace:kube-system,Attempt:1,} returns sandbox id \"5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004\"" Feb 12 19:24:32.312095 kubelet[2016]: E0212 19:24:32.312057 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:32.315309 env[1138]: time="2024-02-12T19:24:32.314297989Z" level=info msg="CreateContainer within sandbox \"5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:24:32.331622 env[1138]: time="2024-02-12T19:24:32.331553538Z" level=info msg="CreateContainer within sandbox \"5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4a02e85e613ceb16b7fbf2d4e82edf601b691dc580ea3d9f05e10efaf7a38467\"" Feb 12 19:24:32.334159 env[1138]: time="2024-02-12T19:24:32.333595337Z" level=info msg="StartContainer for \"4a02e85e613ceb16b7fbf2d4e82edf601b691dc580ea3d9f05e10efaf7a38467\"" Feb 12 19:24:32.351031 systemd[1]: Started cri-containerd-4a02e85e613ceb16b7fbf2d4e82edf601b691dc580ea3d9f05e10efaf7a38467.scope. Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit: BPF prog-id=164 op=LOAD Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3728 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303265383565363133636562313662376662663264346538326564 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3728 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303265383565363133636562313662376662663264346538326564 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.375000 audit: BPF prog-id=165 op=LOAD Feb 12 19:24:32.375000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3728 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303265383565363133636562313662376662663264346538326564 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit: BPF prog-id=166 op=LOAD Feb 12 19:24:32.376000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3728 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303265383565363133636562313662376662663264346538326564 Feb 12 19:24:32.376000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:24:32.376000 audit: BPF prog-id=165 op=UNLOAD Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:32.376000 audit: BPF prog-id=167 op=LOAD Feb 12 19:24:32.376000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3728 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303265383565363133636562313662376662663264346538326564 Feb 12 19:24:32.393466 env[1138]: time="2024-02-12T19:24:32.393391978Z" level=info msg="StartContainer for \"4a02e85e613ceb16b7fbf2d4e82edf601b691dc580ea3d9f05e10efaf7a38467\" returns successfully" Feb 12 19:24:32.834883 env[1138]: time="2024-02-12T19:24:32.834833576Z" level=info msg="StopPodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\"" Feb 12 19:24:32.846731 systemd[1]: Started sshd@9-10.0.0.87:22-10.0.0.1:38754.service. Feb 12 19:24:32.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.87:22-10.0.0.1:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:32.849510 kernel: kauditd_printk_skb: 368 callbacks suppressed Feb 12 19:24:32.849595 kernel: audit: type=1130 audit(1707765872.846:1278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.87:22-10.0.0.1:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:32.910000 audit[3827]: USER_ACCT pid=3827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.911131 sshd[3827]: Accepted publickey for core from 10.0.0.1 port 38754 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:32.911000 audit[3827]: CRED_ACQ pid=3827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.913747 sshd[3827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:32.916147 kernel: audit: type=1101 audit(1707765872.910:1279): pid=3827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.916240 kernel: audit: type=1103 audit(1707765872.911:1280): pid=3827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.916261 kernel: audit: type=1006 audit(1707765872.912:1281): pid=3827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:24:32.920180 systemd-logind[1126]: New session 10 of user core. Feb 12 19:24:32.921123 systemd[1]: Started session-10.scope. Feb 12 19:24:32.912000 audit[3827]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4fe2ba0 a2=3 a3=1 items=0 ppid=1 pid=3827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.926377 kernel: audit: type=1300 audit(1707765872.912:1281): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4fe2ba0 a2=3 a3=1 items=0 ppid=1 pid=3827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.926434 kernel: audit: type=1327 audit(1707765872.912:1281): proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:32.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:32.926000 audit[3827]: USER_START pid=3827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.930228 kernel: audit: type=1105 audit(1707765872.926:1282): pid=3827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.928000 audit[3843]: CRED_ACQ pid=3843 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.933168 kernel: audit: type=1103 audit(1707765872.928:1283): pid=3843 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.889 [INFO][3826] k8s.go 578: Cleaning up netns ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.889 [INFO][3826] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" iface="eth0" netns="/var/run/netns/cni-b77b4b49-de72-b6e6-6fab-575e578a3026" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.889 [INFO][3826] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" iface="eth0" netns="/var/run/netns/cni-b77b4b49-de72-b6e6-6fab-575e578a3026" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.889 [INFO][3826] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" iface="eth0" netns="/var/run/netns/cni-b77b4b49-de72-b6e6-6fab-575e578a3026" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.889 [INFO][3826] k8s.go 585: Releasing IP address(es) ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.889 [INFO][3826] utils.go 188: Calico CNI releasing IP address ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.916 [INFO][3836] ipam_plugin.go 415: Releasing address using handleID ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.916 [INFO][3836] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.916 [INFO][3836] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.930 [WARNING][3836] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.931 [INFO][3836] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.933 [INFO][3836] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:32.936647 env[1138]: 2024-02-12 19:24:32.935 [INFO][3826] k8s.go 591: Teardown processing complete. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:32.937153 env[1138]: time="2024-02-12T19:24:32.936794911Z" level=info msg="TearDown network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" successfully" Feb 12 19:24:32.937153 env[1138]: time="2024-02-12T19:24:32.936827871Z" level=info msg="StopPodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" returns successfully" Feb 12 19:24:32.937566 env[1138]: time="2024-02-12T19:24:32.937536391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8cdfb9-mckkq,Uid:46ecd457-275c-45b3-82b5-556c61c68f2a,Namespace:calico-system,Attempt:1,}" Feb 12 19:24:32.956870 kubelet[2016]: E0212 19:24:32.956837 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:32.957652 kubelet[2016]: E0212 19:24:32.957622 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:32.986838 kubelet[2016]: I0212 19:24:32.986787 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-rkzw2" podStartSLOduration=31.986728239 podCreationTimestamp="2024-02-12 19:24:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:24:32.971588849 +0000 UTC m=+44.267740653" watchObservedRunningTime="2024-02-12 19:24:32.986728239 +0000 UTC m=+44.282880043" Feb 12 19:24:32.989000 audit[3865]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:32.989000 audit[3865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc97d4590 a2=0 a3=ffff837926c0 items=0 ppid=2163 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.995478 kernel: audit: type=1325 audit(1707765872.989:1284): table=filter:108 family=2 entries=8 op=nft_register_rule pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:32.995615 kernel: audit: type=1300 audit(1707765872.989:1284): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc97d4590 a2=0 a3=ffff837926c0 items=0 ppid=2163 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:32.991000 audit[3865]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:32.991000 audit[3865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffc97d4590 a2=0 a3=ffff837926c0 items=0 ppid=2163 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:32.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:33.008000 audit[3867]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:33.008000 audit[3867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffdbef9cd0 a2=0 a3=ffff87b0f6c0 items=0 ppid=2163 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:33.017000 audit[3867]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:33.017000 audit[3867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffdbef9cd0 a2=0 a3=ffff87b0f6c0 items=0 ppid=2163 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:33.088210 sshd[3827]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:33.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.87:22-10.0.0.1:38768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:33.092524 systemd[1]: Started sshd@10-10.0.0.87:22-10.0.0.1:38768.service. Feb 12 19:24:33.103746 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea4ce7251a2: link becomes ready Feb 12 19:24:33.098000 audit[3827]: USER_END pid=3827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.099000 audit[3827]: CRED_DISP pid=3827 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.100935 systemd-networkd[1045]: caliea4ce7251a2: Link UP Feb 12 19:24:33.102217 systemd-networkd[1045]: caliea4ce7251a2: Gained carrier Feb 12 19:24:33.102534 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:24:33.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.87:22-10.0.0.1:38754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:33.104841 systemd[1]: sshd@9-10.0.0.87:22-10.0.0.1:38754.service: Deactivated successfully. Feb 12 19:24:33.106086 systemd-logind[1126]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:24:33.106847 systemd-logind[1126]: Removed session 10. Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.006 [INFO][3844] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0 calico-kube-controllers-774b8cdfb9- calico-system 46ecd457-275c-45b3-82b5-556c61c68f2a 848 0 2024-02-12 19:24:08 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:774b8cdfb9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-774b8cdfb9-mckkq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliea4ce7251a2 [] []}} ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.006 [INFO][3844] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.045 [INFO][3869] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" HandleID="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.057 [INFO][3869] ipam_plugin.go 268: Auto assigning IP ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" HandleID="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011b4a0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-774b8cdfb9-mckkq", "timestamp":"2024-02-12 19:24:33.045606883 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.057 [INFO][3869] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.057 [INFO][3869] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.058 [INFO][3869] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.059 [INFO][3869] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.064 [INFO][3869] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.077 [INFO][3869] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.079 [INFO][3869] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.082 [INFO][3869] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.082 [INFO][3869] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.084 [INFO][3869] ipam.go 1682: Creating new handle: k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054 Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.089 [INFO][3869] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.095 [INFO][3869] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.096 [INFO][3869] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" host="localhost" Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.096 [INFO][3869] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:33.133079 env[1138]: 2024-02-12 19:24:33.096 [INFO][3869] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" HandleID="k8s-pod-network.7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.133893 env[1138]: 2024-02-12 19:24:33.098 [INFO][3844] k8s.go 385: Populated endpoint ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0", GenerateName:"calico-kube-controllers-774b8cdfb9-", Namespace:"calico-system", SelfLink:"", UID:"46ecd457-275c-45b3-82b5-556c61c68f2a", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8cdfb9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-774b8cdfb9-mckkq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea4ce7251a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:33.133893 env[1138]: 2024-02-12 19:24:33.098 [INFO][3844] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.133893 env[1138]: 2024-02-12 19:24:33.098 [INFO][3844] dataplane_linux.go 68: Setting the host side veth name to caliea4ce7251a2 ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.133893 env[1138]: 2024-02-12 19:24:33.101 [INFO][3844] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.133893 env[1138]: 2024-02-12 19:24:33.103 [INFO][3844] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0", GenerateName:"calico-kube-controllers-774b8cdfb9-", Namespace:"calico-system", SelfLink:"", UID:"46ecd457-275c-45b3-82b5-556c61c68f2a", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8cdfb9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054", Pod:"calico-kube-controllers-774b8cdfb9-mckkq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea4ce7251a2", MAC:"12:5d:33:b2:d4:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:33.133893 env[1138]: 2024-02-12 19:24:33.131 [INFO][3844] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054" Namespace="calico-system" Pod="calico-kube-controllers-774b8cdfb9-mckkq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:33.144000 audit[3880]: USER_ACCT pid=3880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.145224 sshd[3880]: Accepted publickey for core from 10.0.0.1 port 38768 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:33.145000 audit[3880]: CRED_ACQ pid=3880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.145000 audit[3880]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1e0fc20 a2=3 a3=1 items=0 ppid=1 pid=3880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:33.146602 sshd[3880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:33.160681 systemd[1]: Started session-11.scope. Feb 12 19:24:33.161387 systemd-logind[1126]: New session 11 of user core. Feb 12 19:24:33.165000 audit[3880]: USER_START pid=3880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.167000 audit[3898]: CRED_ACQ pid=3898 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.173346 systemd[1]: run-netns-cni\x2db77b4b49\x2dde72\x2db6e6\x2d6fab\x2d575e578a3026.mount: Deactivated successfully. Feb 12 19:24:33.177929 env[1138]: time="2024-02-12T19:24:33.177846364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:24:33.178072 env[1138]: time="2024-02-12T19:24:33.177973724Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:24:33.178072 env[1138]: time="2024-02-12T19:24:33.177992884Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:24:33.178296 env[1138]: time="2024-02-12T19:24:33.178227524Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054 pid=3908 runtime=io.containerd.runc.v2 Feb 12 19:24:33.180000 audit[3916]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:24:33.180000 audit[3916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffdd9d54c0 a2=0 a3=ffffa0c70fa8 items=0 ppid=3256 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.180000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:24:33.191983 systemd[1]: Started cri-containerd-7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054.scope. Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.251000 audit: BPF prog-id=168 op=LOAD Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3908 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764396132646437663364313062363337316536363739363565303737 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3908 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764396132646437663364313062363337316536363739363565303737 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit: BPF prog-id=169 op=LOAD Feb 12 19:24:33.254000 audit[3920]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3908 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764396132646437663364313062363337316536363739363565303737 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit: BPF prog-id=170 op=LOAD Feb 12 19:24:33.254000 audit[3920]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3908 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764396132646437663364313062363337316536363739363565303737 Feb 12 19:24:33.254000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:24:33.254000 audit: BPF prog-id=169 op=UNLOAD Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.254000 audit: BPF prog-id=171 op=LOAD Feb 12 19:24:33.254000 audit[3920]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3908 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764396132646437663364313062363337316536363739363565303737 Feb 12 19:24:33.259965 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:24:33.284561 env[1138]: time="2024-02-12T19:24:33.284517220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8cdfb9-mckkq,Uid:46ecd457-275c-45b3-82b5-556c61c68f2a,Namespace:calico-system,Attempt:1,} returns sandbox id \"7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054\"" Feb 12 19:24:33.420811 env[1138]: time="2024-02-12T19:24:33.420694099Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:33.422712 env[1138]: time="2024-02-12T19:24:33.422679977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:33.424624 env[1138]: time="2024-02-12T19:24:33.424595856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:33.426390 env[1138]: time="2024-02-12T19:24:33.426346175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:33.426597 env[1138]: time="2024-02-12T19:24:33.426567095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:24:33.428848 env[1138]: time="2024-02-12T19:24:33.427473575Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:24:33.429698 env[1138]: time="2024-02-12T19:24:33.429594013Z" level=info msg="CreateContainer within sandbox \"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:24:33.449885 env[1138]: time="2024-02-12T19:24:33.449830441Z" level=info msg="CreateContainer within sandbox \"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"daf55146752a06febe2806a6f15d68df19b5aaebf609b7e874efcfdf3da2625b\"" Feb 12 19:24:33.450622 env[1138]: time="2024-02-12T19:24:33.450594801Z" level=info msg="StartContainer for \"daf55146752a06febe2806a6f15d68df19b5aaebf609b7e874efcfdf3da2625b\"" Feb 12 19:24:33.467106 systemd[1]: Started cri-containerd-daf55146752a06febe2806a6f15d68df19b5aaebf609b7e874efcfdf3da2625b.scope. Feb 12 19:24:33.498474 sshd[3880]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:33.504930 systemd[1]: Started sshd@11-10.0.0.87:22-10.0.0.1:38780.service. Feb 12 19:24:33.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.87:22-10.0.0.1:38780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:33.505000 audit[3880]: USER_END pid=3880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.505000 audit[3880]: CRED_DISP pid=3880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.87:22-10.0.0.1:38768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:33.513285 systemd[1]: sshd@10-10.0.0.87:22-10.0.0.1:38768.service: Deactivated successfully. Feb 12 19:24:33.514478 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:24:33.519871 systemd-logind[1126]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:24:33.527811 systemd-logind[1126]: Removed session 11. Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3672 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663535313436373532613036666562653238303661366631356436 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit: BPF prog-id=172 op=LOAD Feb 12 19:24:33.537000 audit[3956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3672 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663535313436373532613036666562653238303661366631356436 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit: BPF prog-id=173 op=LOAD Feb 12 19:24:33.537000 audit[3956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3672 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663535313436373532613036666562653238303661366631356436 Feb 12 19:24:33.537000 audit: BPF prog-id=173 op=UNLOAD Feb 12 19:24:33.537000 audit: BPF prog-id=172 op=UNLOAD Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { perfmon } for pid=3956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit[3956]: AVC avc: denied { bpf } for pid=3956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:33.537000 audit: BPF prog-id=174 op=LOAD Feb 12 19:24:33.537000 audit[3956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3672 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663535313436373532613036666562653238303661366631356436 Feb 12 19:24:33.572000 audit[3974]: USER_ACCT pid=3974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.573549 sshd[3974]: Accepted publickey for core from 10.0.0.1 port 38780 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:33.573000 audit[3974]: CRED_ACQ pid=3974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.573000 audit[3974]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2901e50 a2=3 a3=1 items=0 ppid=1 pid=3974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:33.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:33.574746 sshd[3974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:33.575927 env[1138]: time="2024-02-12T19:24:33.575864486Z" level=info msg="StartContainer for \"daf55146752a06febe2806a6f15d68df19b5aaebf609b7e874efcfdf3da2625b\" returns successfully" Feb 12 19:24:33.581788 systemd[1]: Started session-12.scope. Feb 12 19:24:33.582262 systemd-logind[1126]: New session 12 of user core. Feb 12 19:24:33.585000 audit[3974]: USER_START pid=3974 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.587000 audit[3988]: CRED_ACQ pid=3988 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.705366 sshd[3974]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:33.706000 audit[3974]: USER_END pid=3974 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.706000 audit[3974]: CRED_DISP pid=3974 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:33.711700 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:24:33.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.87:22-10.0.0.1:38780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:33.712595 systemd[1]: sshd@11-10.0.0.87:22-10.0.0.1:38780.service: Deactivated successfully. Feb 12 19:24:33.713460 systemd-logind[1126]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:24:33.714323 systemd-logind[1126]: Removed session 12. Feb 12 19:24:33.764858 systemd-networkd[1045]: cali23319e6ad54: Gained IPv6LL Feb 12 19:24:33.892824 systemd-networkd[1045]: cali47a1ce5e709: Gained IPv6LL Feb 12 19:24:33.964499 kubelet[2016]: E0212 19:24:33.964030 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:34.965876 kubelet[2016]: E0212 19:24:34.965845 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:35.045751 systemd-networkd[1045]: caliea4ce7251a2: Gained IPv6LL Feb 12 19:24:35.191828 env[1138]: time="2024-02-12T19:24:35.191760489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:35.193788 env[1138]: time="2024-02-12T19:24:35.193708928Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:35.195390 env[1138]: time="2024-02-12T19:24:35.195357127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:35.197956 env[1138]: time="2024-02-12T19:24:35.197904686Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:35.198562 env[1138]: time="2024-02-12T19:24:35.198524285Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 19:24:35.201401 env[1138]: time="2024-02-12T19:24:35.200694204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:24:35.217279 env[1138]: time="2024-02-12T19:24:35.217164755Z" level=info msg="CreateContainer within sandbox \"7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:24:35.238682 env[1138]: time="2024-02-12T19:24:35.238566824Z" level=info msg="CreateContainer within sandbox \"7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ea863d40216872ecd3d5873c65556984849a3a10c03635e7fedd7e3d4dfa91ed\"" Feb 12 19:24:35.240978 env[1138]: time="2024-02-12T19:24:35.240930503Z" level=info msg="StartContainer for \"ea863d40216872ecd3d5873c65556984849a3a10c03635e7fedd7e3d4dfa91ed\"" Feb 12 19:24:35.263937 systemd[1]: Started cri-containerd-ea863d40216872ecd3d5873c65556984849a3a10c03635e7fedd7e3d4dfa91ed.scope. Feb 12 19:24:35.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit: BPF prog-id=175 op=LOAD Feb 12 19:24:35.315000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.315000 audit[4008]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3908 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:35.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561383633643430323136383732656364336435383733633635353536 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3908 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:35.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561383633643430323136383732656364336435383733633635353536 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.316000 audit: BPF prog-id=176 op=LOAD Feb 12 19:24:35.316000 audit[4008]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3908 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:35.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561383633643430323136383732656364336435383733633635353536 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.317000 audit: BPF prog-id=177 op=LOAD Feb 12 19:24:35.317000 audit[4008]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3908 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:35.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561383633643430323136383732656364336435383733633635353536 Feb 12 19:24:35.318000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:24:35.318000 audit: BPF prog-id=176 op=UNLOAD Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:35.318000 audit: BPF prog-id=178 op=LOAD Feb 12 19:24:35.318000 audit[4008]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3908 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:35.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561383633643430323136383732656364336435383733633635353536 Feb 12 19:24:35.350365 env[1138]: time="2024-02-12T19:24:35.350249045Z" level=info msg="StartContainer for \"ea863d40216872ecd3d5873c65556984849a3a10c03635e7fedd7e3d4dfa91ed\" returns successfully" Feb 12 19:24:35.984059 kubelet[2016]: I0212 19:24:35.983988 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-774b8cdfb9-mckkq" podStartSLOduration=26.070860766 podCreationTimestamp="2024-02-12 19:24:08 +0000 UTC" firstStartedPulling="2024-02-12 19:24:33.285854819 +0000 UTC m=+44.582006623" lastFinishedPulling="2024-02-12 19:24:35.198942845 +0000 UTC m=+46.495094649" observedRunningTime="2024-02-12 19:24:35.983083272 +0000 UTC m=+47.279235076" watchObservedRunningTime="2024-02-12 19:24:35.983948792 +0000 UTC m=+47.280100556" Feb 12 19:24:36.019069 kubelet[2016]: I0212 19:24:36.019025 2016 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:24:36.020004 kubelet[2016]: E0212 19:24:36.019984 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:36.529013 env[1138]: time="2024-02-12T19:24:36.528936042Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:36.532060 env[1138]: time="2024-02-12T19:24:36.531991561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:36.534634 env[1138]: time="2024-02-12T19:24:36.534588719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:36.538760 env[1138]: time="2024-02-12T19:24:36.538712397Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:24:36.539406 env[1138]: time="2024-02-12T19:24:36.539361277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:24:36.543470 env[1138]: time="2024-02-12T19:24:36.543374715Z" level=info msg="CreateContainer within sandbox \"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:24:36.573385 env[1138]: time="2024-02-12T19:24:36.573322700Z" level=info msg="CreateContainer within sandbox \"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"db54579d6954f425c85611b95325e3ff51d54c8498c818a0af947ec5fba87b64\"" Feb 12 19:24:36.574123 env[1138]: time="2024-02-12T19:24:36.574089580Z" level=info msg="StartContainer for \"db54579d6954f425c85611b95325e3ff51d54c8498c818a0af947ec5fba87b64\"" Feb 12 19:24:36.601283 systemd[1]: Started cri-containerd-db54579d6954f425c85611b95325e3ff51d54c8498c818a0af947ec5fba87b64.scope. Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3672 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:36.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353435373964363935346634323563383536313162393533323565 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.653000 audit: BPF prog-id=179 op=LOAD Feb 12 19:24:36.653000 audit[4109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3672 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:36.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353435373964363935346634323563383536313162393533323565 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.654000 audit: BPF prog-id=180 op=LOAD Feb 12 19:24:36.654000 audit[4109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3672 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:36.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353435373964363935346634323563383536313162393533323565 Feb 12 19:24:36.655000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:24:36.656000 audit: BPF prog-id=179 op=UNLOAD Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:24:36.656000 audit: BPF prog-id=181 op=LOAD Feb 12 19:24:36.656000 audit[4109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3672 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:36.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353435373964363935346634323563383536313162393533323565 Feb 12 19:24:36.698112 env[1138]: time="2024-02-12T19:24:36.698047519Z" level=info msg="StartContainer for \"db54579d6954f425c85611b95325e3ff51d54c8498c818a0af947ec5fba87b64\" returns successfully" Feb 12 19:24:36.916766 kubelet[2016]: I0212 19:24:36.914132 2016 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:24:36.917201 kubelet[2016]: I0212 19:24:36.917182 2016 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:24:36.976726 kubelet[2016]: E0212 19:24:36.976694 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:24:36.989163 kubelet[2016]: I0212 19:24:36.989125 2016 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-b9cl8" podStartSLOduration=24.699383248 podCreationTimestamp="2024-02-12 19:24:08 +0000 UTC" firstStartedPulling="2024-02-12 19:24:32.25027791 +0000 UTC m=+43.546429714" lastFinishedPulling="2024-02-12 19:24:36.539979917 +0000 UTC m=+47.836131721" observedRunningTime="2024-02-12 19:24:36.988427815 +0000 UTC m=+48.284579619" watchObservedRunningTime="2024-02-12 19:24:36.989085255 +0000 UTC m=+48.285237059" Feb 12 19:24:38.712668 systemd[1]: Started sshd@12-10.0.0.87:22-10.0.0.1:38796.service. Feb 12 19:24:38.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.87:22-10.0.0.1:38796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:38.713842 kernel: kauditd_printk_skb: 238 callbacks suppressed Feb 12 19:24:38.713882 kernel: audit: type=1130 audit(1707765878.712:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.87:22-10.0.0.1:38796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:38.761197 sshd[4156]: Accepted publickey for core from 10.0.0.1 port 38796 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:38.760000 audit[4156]: USER_ACCT pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.762000 audit[4156]: CRED_ACQ pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.764516 sshd[4156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:38.766756 kernel: audit: type=1101 audit(1707765878.760:1359): pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.766861 kernel: audit: type=1103 audit(1707765878.762:1360): pid=4156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.766887 kernel: audit: type=1006 audit(1707765878.762:1361): pid=4156 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 19:24:38.762000 audit[4156]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd934f770 a2=3 a3=1 items=0 ppid=1 pid=4156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:38.771258 kernel: audit: type=1300 audit(1707765878.762:1361): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd934f770 a2=3 a3=1 items=0 ppid=1 pid=4156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:38.771351 kernel: audit: type=1327 audit(1707765878.762:1361): proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:38.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:38.770919 systemd[1]: Started session-13.scope. Feb 12 19:24:38.771087 systemd-logind[1126]: New session 13 of user core. Feb 12 19:24:38.776000 audit[4156]: USER_START pid=4156 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.778000 audit[4158]: CRED_ACQ pid=4158 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.784481 kernel: audit: type=1105 audit(1707765878.776:1362): pid=4156 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.784565 kernel: audit: type=1103 audit(1707765878.778:1363): pid=4158 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.909350 sshd[4156]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:38.909000 audit[4156]: USER_END pid=4156 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.912444 systemd[1]: sshd@12-10.0.0.87:22-10.0.0.1:38796.service: Deactivated successfully. Feb 12 19:24:38.909000 audit[4156]: CRED_DISP pid=4156 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.913279 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:24:38.913875 systemd-logind[1126]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:24:38.914556 systemd-logind[1126]: Removed session 13. Feb 12 19:24:38.915247 kernel: audit: type=1106 audit(1707765878.909:1364): pid=4156 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.915318 kernel: audit: type=1104 audit(1707765878.909:1365): pid=4156 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:38.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.87:22-10.0.0.1:38796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:43.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.87:22-10.0.0.1:52702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:43.914347 systemd[1]: Started sshd@13-10.0.0.87:22-10.0.0.1:52702.service. Feb 12 19:24:43.916832 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:24:43.916880 kernel: audit: type=1130 audit(1707765883.913:1367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.87:22-10.0.0.1:52702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:43.993000 audit[4178]: USER_ACCT pid=4178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:43.994460 sshd[4178]: Accepted publickey for core from 10.0.0.1 port 52702 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:43.997681 kernel: audit: type=1101 audit(1707765883.993:1368): pid=4178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:43.998000 audit[4178]: CRED_ACQ pid=4178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.002179 sshd[4178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:44.003468 kernel: audit: type=1103 audit(1707765883.998:1369): pid=4178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.003544 kernel: audit: type=1006 audit(1707765883.998:1370): pid=4178 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 19:24:44.003572 kernel: audit: type=1300 audit(1707765883.998:1370): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd122bad0 a2=3 a3=1 items=0 ppid=1 pid=4178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:43.998000 audit[4178]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd122bad0 a2=3 a3=1 items=0 ppid=1 pid=4178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:43.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:44.007103 kernel: audit: type=1327 audit(1707765883.998:1370): proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:44.007746 systemd-logind[1126]: New session 14 of user core. Feb 12 19:24:44.007808 systemd[1]: Started session-14.scope. Feb 12 19:24:44.012000 audit[4178]: USER_START pid=4178 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.013000 audit[4180]: CRED_ACQ pid=4180 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.019563 kernel: audit: type=1105 audit(1707765884.012:1371): pid=4178 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.019634 kernel: audit: type=1103 audit(1707765884.013:1372): pid=4180 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.140032 sshd[4178]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:44.141000 audit[4178]: USER_END pid=4178 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.143736 systemd[1]: sshd@13-10.0.0.87:22-10.0.0.1:52702.service: Deactivated successfully. Feb 12 19:24:44.144517 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:24:44.141000 audit[4178]: CRED_DISP pid=4178 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.147439 systemd-logind[1126]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:24:44.148183 systemd-logind[1126]: Removed session 14. Feb 12 19:24:44.150092 kernel: audit: type=1106 audit(1707765884.141:1373): pid=4178 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.150158 kernel: audit: type=1104 audit(1707765884.141:1374): pid=4178 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:44.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.87:22-10.0.0.1:52702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:45.458000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.458000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4005b71f60 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:24:45.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:24:45.458000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.458000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40077b7050 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:24:45.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:24:45.460000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.460000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4007365f50 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:24:45.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:24:45.461000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.461000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4007365fb0 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:24:45.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:24:45.461000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.461000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4007bf00c0 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:24:45.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:24:45.461000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.461000 audit[1898]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400f6142a0 a2=fc6 a3=0 items=0 ppid=1721 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c64 key=(null) Feb 12 19:24:45.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 12 19:24:45.701000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.701000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002165380 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:24:45.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:24:45.701000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:45.701000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002986ae0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:24:45.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:24:48.329000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:48.329000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400291e8c0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:24:48.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:24:48.331000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:48.331000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029871e0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:24:48.331000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:24:48.332000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:48.332000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400291e9e0 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:24:48.332000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:24:48.332000 audit[1896]: AVC avc: denied { watch } for pid=1896 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:24:48.332000 audit[1896]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002987200 a2=fc6 a3=0 items=0 ppid=1747 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c905 key=(null) Feb 12 19:24:48.332000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:24:48.821616 env[1138]: time="2024-02-12T19:24:48.821457098Z" level=info msg="StopPodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\"" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.872 [WARNING][4212] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0", GenerateName:"calico-kube-controllers-774b8cdfb9-", Namespace:"calico-system", SelfLink:"", UID:"46ecd457-275c-45b3-82b5-556c61c68f2a", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8cdfb9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054", Pod:"calico-kube-controllers-774b8cdfb9-mckkq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea4ce7251a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.872 [INFO][4212] k8s.go 578: Cleaning up netns ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.872 [INFO][4212] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" iface="eth0" netns="" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.872 [INFO][4212] k8s.go 585: Releasing IP address(es) ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.872 [INFO][4212] utils.go 188: Calico CNI releasing IP address ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.895 [INFO][4222] ipam_plugin.go 415: Releasing address using handleID ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.896 [INFO][4222] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.896 [INFO][4222] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.906 [WARNING][4222] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.906 [INFO][4222] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.908 [INFO][4222] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:48.916709 env[1138]: 2024-02-12 19:24:48.915 [INFO][4212] k8s.go 591: Teardown processing complete. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.917277 env[1138]: time="2024-02-12T19:24:48.916735996Z" level=info msg="TearDown network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" successfully" Feb 12 19:24:48.917277 env[1138]: time="2024-02-12T19:24:48.916764556Z" level=info msg="StopPodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" returns successfully" Feb 12 19:24:48.917695 env[1138]: time="2024-02-12T19:24:48.917648196Z" level=info msg="RemovePodSandbox for \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\"" Feb 12 19:24:48.917769 env[1138]: time="2024-02-12T19:24:48.917693596Z" level=info msg="Forcibly stopping sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\"" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.954 [WARNING][4245] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0", GenerateName:"calico-kube-controllers-774b8cdfb9-", Namespace:"calico-system", SelfLink:"", UID:"46ecd457-275c-45b3-82b5-556c61c68f2a", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8cdfb9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d9a2dd7f3d10b6371e667965e077dc826f551d62541332dd11173df9bfad054", Pod:"calico-kube-controllers-774b8cdfb9-mckkq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea4ce7251a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.955 [INFO][4245] k8s.go 578: Cleaning up netns ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.955 [INFO][4245] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" iface="eth0" netns="" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.955 [INFO][4245] k8s.go 585: Releasing IP address(es) ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.955 [INFO][4245] utils.go 188: Calico CNI releasing IP address ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.977 [INFO][4253] ipam_plugin.go 415: Releasing address using handleID ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.977 [INFO][4253] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.977 [INFO][4253] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.991 [WARNING][4253] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.992 [INFO][4253] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" HandleID="k8s-pod-network.24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Workload="localhost-k8s-calico--kube--controllers--774b8cdfb9--mckkq-eth0" Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.994 [INFO][4253] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:48.999994 env[1138]: 2024-02-12 19:24:48.996 [INFO][4245] k8s.go 591: Teardown processing complete. ContainerID="24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93" Feb 12 19:24:49.000502 env[1138]: time="2024-02-12T19:24:49.000021977Z" level=info msg="TearDown network for sandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" successfully" Feb 12 19:24:49.054022 env[1138]: time="2024-02-12T19:24:49.053959766Z" level=info msg="RemovePodSandbox \"24be18cb519a28f58af81fd6b06e3b2023c804f83e62c9ff65954049b9c3eb93\" returns successfully" Feb 12 19:24:49.054876 env[1138]: time="2024-02-12T19:24:49.054603886Z" level=info msg="StopPodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\"" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.088 [WARNING][4278] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--fp5wf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f15ac41d-c9ad-4a99-ae08-59248eacf9a2", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23", Pod:"coredns-5dd5756b68-fp5wf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali880f4731d9c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.088 [INFO][4278] k8s.go 578: Cleaning up netns ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.088 [INFO][4278] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" iface="eth0" netns="" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.088 [INFO][4278] k8s.go 585: Releasing IP address(es) ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.088 [INFO][4278] utils.go 188: Calico CNI releasing IP address ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.105 [INFO][4285] ipam_plugin.go 415: Releasing address using handleID ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.105 [INFO][4285] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.105 [INFO][4285] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.115 [WARNING][4285] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.115 [INFO][4285] ipam_plugin.go 443: Releasing address using workloadID ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.116 [INFO][4285] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:49.119948 env[1138]: 2024-02-12 19:24:49.118 [INFO][4278] k8s.go 591: Teardown processing complete. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.120356 env[1138]: time="2024-02-12T19:24:49.119933672Z" level=info msg="TearDown network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" successfully" Feb 12 19:24:49.120356 env[1138]: time="2024-02-12T19:24:49.119979512Z" level=info msg="StopPodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" returns successfully" Feb 12 19:24:49.120881 env[1138]: time="2024-02-12T19:24:49.120852112Z" level=info msg="RemovePodSandbox for \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\"" Feb 12 19:24:49.120943 env[1138]: time="2024-02-12T19:24:49.120892592Z" level=info msg="Forcibly stopping sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\"" Feb 12 19:24:49.145006 systemd[1]: Started sshd@14-10.0.0.87:22-10.0.0.1:52710.service. Feb 12 19:24:49.148146 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 12 19:24:49.148176 kernel: audit: type=1130 audit(1707765889.144:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.87:22-10.0.0.1:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:49.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.87:22-10.0.0.1:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:49.191702 kernel: audit: type=1101 audit(1707765889.184:1389): pid=4316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.191801 kernel: audit: type=1103 audit(1707765889.185:1390): pid=4316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.191822 kernel: audit: type=1006 audit(1707765889.185:1391): pid=4316 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:24:49.191842 kernel: audit: type=1300 audit(1707765889.185:1391): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc73907e0 a2=3 a3=1 items=0 ppid=1 pid=4316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:49.184000 audit[4316]: USER_ACCT pid=4316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.185000 audit[4316]: CRED_ACQ pid=4316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.185000 audit[4316]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc73907e0 a2=3 a3=1 items=0 ppid=1 pid=4316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:49.190936 systemd[1]: Started session-15.scope. Feb 12 19:24:49.186228 sshd[4316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:49.192303 sshd[4316]: Accepted publickey for core from 10.0.0.1 port 52710 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:49.191273 systemd-logind[1126]: New session 15 of user core. Feb 12 19:24:49.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:49.194252 kernel: audit: type=1327 audit(1707765889.185:1391): proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:49.194000 audit[4316]: USER_START pid=4316 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.195000 audit[4326]: CRED_ACQ pid=4326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.199014 kernel: audit: type=1105 audit(1707765889.194:1392): pid=4316 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.204023 kernel: audit: type=1103 audit(1707765889.195:1393): pid=4326 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.164 [WARNING][4309] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--fp5wf-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f15ac41d-c9ad-4a99-ae08-59248eacf9a2", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3eb5754fb6f4ca180ad3ef07824a5435f5d044d56f904b9258ba8d78a7c2da23", Pod:"coredns-5dd5756b68-fp5wf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali880f4731d9c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.165 [INFO][4309] k8s.go 578: Cleaning up netns ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.165 [INFO][4309] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" iface="eth0" netns="" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.165 [INFO][4309] k8s.go 585: Releasing IP address(es) ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.165 [INFO][4309] utils.go 188: Calico CNI releasing IP address ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.182 [INFO][4319] ipam_plugin.go 415: Releasing address using handleID ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.182 [INFO][4319] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.183 [INFO][4319] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.201 [WARNING][4319] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.201 [INFO][4319] ipam_plugin.go 443: Releasing address using workloadID ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" HandleID="k8s-pod-network.34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Workload="localhost-k8s-coredns--5dd5756b68--fp5wf-eth0" Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.206 [INFO][4319] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:49.210266 env[1138]: 2024-02-12 19:24:49.208 [INFO][4309] k8s.go 591: Teardown processing complete. ContainerID="34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5" Feb 12 19:24:49.210676 env[1138]: time="2024-02-12T19:24:49.210304253Z" level=info msg="TearDown network for sandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" successfully" Feb 12 19:24:49.213240 env[1138]: time="2024-02-12T19:24:49.213202132Z" level=info msg="RemovePodSandbox \"34fc2ff4f583b5588d1e72fa7548777d72b73c913c05d54ba58d810bf88a43d5\" returns successfully" Feb 12 19:24:49.213802 env[1138]: time="2024-02-12T19:24:49.213746612Z" level=info msg="StopPodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\"" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.258 [WARNING][4343] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b9cl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15798585-dd7e-43ea-940e-23d08ef03b22", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed", Pod:"csi-node-driver-b9cl8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47a1ce5e709", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.259 [INFO][4343] k8s.go 578: Cleaning up netns ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.259 [INFO][4343] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" iface="eth0" netns="" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.259 [INFO][4343] k8s.go 585: Releasing IP address(es) ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.259 [INFO][4343] utils.go 188: Calico CNI releasing IP address ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.282 [INFO][4359] ipam_plugin.go 415: Releasing address using handleID ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.282 [INFO][4359] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.282 [INFO][4359] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.292 [WARNING][4359] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.292 [INFO][4359] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.294 [INFO][4359] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:49.300079 env[1138]: 2024-02-12 19:24:49.298 [INFO][4343] k8s.go 591: Teardown processing complete. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.300079 env[1138]: time="2024-02-12T19:24:49.300015073Z" level=info msg="TearDown network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" successfully" Feb 12 19:24:49.300079 env[1138]: time="2024-02-12T19:24:49.300043993Z" level=info msg="StopPodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" returns successfully" Feb 12 19:24:49.300544 env[1138]: time="2024-02-12T19:24:49.300505393Z" level=info msg="RemovePodSandbox for \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\"" Feb 12 19:24:49.300570 env[1138]: time="2024-02-12T19:24:49.300538193Z" level=info msg="Forcibly stopping sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\"" Feb 12 19:24:49.330890 sshd[4316]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:49.332000 audit[4316]: USER_END pid=4316 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.335146 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:24:49.335918 systemd[1]: sshd@14-10.0.0.87:22-10.0.0.1:52710.service: Deactivated successfully. Feb 12 19:24:49.336692 systemd-logind[1126]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:24:49.333000 audit[4316]: CRED_DISP pid=4316 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.337380 systemd-logind[1126]: Removed session 15. Feb 12 19:24:49.339095 kernel: audit: type=1106 audit(1707765889.332:1394): pid=4316 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.339214 kernel: audit: type=1104 audit(1707765889.333:1395): pid=4316 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:49.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.87:22-10.0.0.1:52710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.353 [WARNING][4383] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b9cl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15798585-dd7e-43ea-940e-23d08ef03b22", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8086edddcf7c6c70ea08108f5effefe9ca6c5f9242c3b597c5fd74bcd018e6ed", Pod:"csi-node-driver-b9cl8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali47a1ce5e709", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.353 [INFO][4383] k8s.go 578: Cleaning up netns ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.353 [INFO][4383] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" iface="eth0" netns="" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.353 [INFO][4383] k8s.go 585: Releasing IP address(es) ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.353 [INFO][4383] utils.go 188: Calico CNI releasing IP address ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.371 [INFO][4391] ipam_plugin.go 415: Releasing address using handleID ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.371 [INFO][4391] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.371 [INFO][4391] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.381 [WARNING][4391] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.381 [INFO][4391] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" HandleID="k8s-pod-network.7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Workload="localhost-k8s-csi--node--driver--b9cl8-eth0" Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.383 [INFO][4391] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:49.387834 env[1138]: 2024-02-12 19:24:49.385 [INFO][4383] k8s.go 591: Teardown processing complete. ContainerID="7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5" Feb 12 19:24:49.387834 env[1138]: time="2024-02-12T19:24:49.387190655Z" level=info msg="TearDown network for sandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" successfully" Feb 12 19:24:49.396527 env[1138]: time="2024-02-12T19:24:49.396453373Z" level=info msg="RemovePodSandbox \"7781ebd673f56e8d281535202270011b3e52a9c38bf3dce783294718722de0c5\" returns successfully" Feb 12 19:24:49.397087 env[1138]: time="2024-02-12T19:24:49.397029853Z" level=info msg="StopPodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\"" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.434 [WARNING][4413] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--rkzw2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5f5be533-01e3-42d4-b4c1-ead9830362ea", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004", Pod:"coredns-5dd5756b68-rkzw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali23319e6ad54", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.434 [INFO][4413] k8s.go 578: Cleaning up netns ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.434 [INFO][4413] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" iface="eth0" netns="" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.434 [INFO][4413] k8s.go 585: Releasing IP address(es) ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.434 [INFO][4413] utils.go 188: Calico CNI releasing IP address ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.454 [INFO][4421] ipam_plugin.go 415: Releasing address using handleID ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.454 [INFO][4421] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.454 [INFO][4421] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.465 [WARNING][4421] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.465 [INFO][4421] ipam_plugin.go 443: Releasing address using workloadID ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.467 [INFO][4421] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:49.471173 env[1138]: 2024-02-12 19:24:49.469 [INFO][4413] k8s.go 591: Teardown processing complete. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.471646 env[1138]: time="2024-02-12T19:24:49.471208237Z" level=info msg="TearDown network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" successfully" Feb 12 19:24:49.471646 env[1138]: time="2024-02-12T19:24:49.471239477Z" level=info msg="StopPodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" returns successfully" Feb 12 19:24:49.471836 env[1138]: time="2024-02-12T19:24:49.471807757Z" level=info msg="RemovePodSandbox for \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\"" Feb 12 19:24:49.471886 env[1138]: time="2024-02-12T19:24:49.471846037Z" level=info msg="Forcibly stopping sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\"" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.508 [WARNING][4443] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--rkzw2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5f5be533-01e3-42d4-b4c1-ead9830362ea", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 24, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5978d6eec9cf9ccf710da09de1eec97e47176708c8037389b6e6f5375da3e004", Pod:"coredns-5dd5756b68-rkzw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali23319e6ad54", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.508 [INFO][4443] k8s.go 578: Cleaning up netns ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.508 [INFO][4443] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" iface="eth0" netns="" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.508 [INFO][4443] k8s.go 585: Releasing IP address(es) ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.508 [INFO][4443] utils.go 188: Calico CNI releasing IP address ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.528 [INFO][4451] ipam_plugin.go 415: Releasing address using handleID ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.528 [INFO][4451] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.528 [INFO][4451] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.538 [WARNING][4451] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.539 [INFO][4451] ipam_plugin.go 443: Releasing address using workloadID ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" HandleID="k8s-pod-network.107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Workload="localhost-k8s-coredns--5dd5756b68--rkzw2-eth0" Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.540 [INFO][4451] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:24:49.543829 env[1138]: 2024-02-12 19:24:49.542 [INFO][4443] k8s.go 591: Teardown processing complete. ContainerID="107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03" Feb 12 19:24:49.544535 env[1138]: time="2024-02-12T19:24:49.543861701Z" level=info msg="TearDown network for sandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" successfully" Feb 12 19:24:49.546791 env[1138]: time="2024-02-12T19:24:49.546751581Z" level=info msg="RemovePodSandbox \"107ad31f1ddaa6310c5da80a5cbbf250a0102f1ee7409dbdbffb6571e4485c03\" returns successfully" Feb 12 19:24:54.337928 systemd[1]: Started sshd@15-10.0.0.87:22-10.0.0.1:57000.service. Feb 12 19:24:54.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.87:22-10.0.0.1:57000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:54.341125 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:24:54.341216 kernel: audit: type=1130 audit(1707765894.337:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.87:22-10.0.0.1:57000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:54.380000 audit[4483]: USER_ACCT pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.381618 sshd[4483]: Accepted publickey for core from 10.0.0.1 port 57000 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:54.383241 sshd[4483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:54.382000 audit[4483]: CRED_ACQ pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.387749 kernel: audit: type=1101 audit(1707765894.380:1398): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.387825 kernel: audit: type=1103 audit(1707765894.382:1399): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.387848 kernel: audit: type=1006 audit(1707765894.382:1400): pid=4483 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:24:54.388941 kernel: audit: type=1300 audit(1707765894.382:1400): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4809600 a2=3 a3=1 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:54.382000 audit[4483]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4809600 a2=3 a3=1 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:54.391655 kernel: audit: type=1327 audit(1707765894.382:1400): proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:54.382000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:54.391813 systemd-logind[1126]: New session 16 of user core. Feb 12 19:24:54.392188 systemd[1]: Started session-16.scope. Feb 12 19:24:54.397000 audit[4483]: USER_START pid=4483 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.398000 audit[4485]: CRED_ACQ pid=4485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.403351 kernel: audit: type=1105 audit(1707765894.397:1401): pid=4483 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.403408 kernel: audit: type=1103 audit(1707765894.398:1402): pid=4485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.538265 sshd[4483]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:54.539000 audit[4483]: USER_END pid=4483 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.543536 systemd[1]: Started sshd@16-10.0.0.87:22-10.0.0.1:57010.service. Feb 12 19:24:54.541000 audit[4483]: CRED_DISP pid=4483 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.546198 systemd[1]: sshd@15-10.0.0.87:22-10.0.0.1:57000.service: Deactivated successfully. Feb 12 19:24:54.547006 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:24:54.548684 kernel: audit: type=1106 audit(1707765894.539:1403): pid=4483 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.549021 kernel: audit: type=1104 audit(1707765894.541:1404): pid=4483 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.87:22-10.0.0.1:57010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:54.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.87:22-10.0.0.1:57000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:54.551141 systemd-logind[1126]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:24:54.553517 systemd-logind[1126]: Removed session 16. Feb 12 19:24:54.578000 audit[4495]: USER_ACCT pid=4495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.579843 sshd[4495]: Accepted publickey for core from 10.0.0.1 port 57010 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:54.579000 audit[4495]: CRED_ACQ pid=4495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.580000 audit[4495]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2d2b1e0 a2=3 a3=1 items=0 ppid=1 pid=4495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:54.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:54.580986 sshd[4495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:54.585717 systemd-logind[1126]: New session 17 of user core. Feb 12 19:24:54.585897 systemd[1]: Started session-17.scope. Feb 12 19:24:54.588000 audit[4495]: USER_START pid=4495 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.590000 audit[4498]: CRED_ACQ pid=4498 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.828437 sshd[4495]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:54.830000 audit[4495]: USER_END pid=4495 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.830000 audit[4495]: CRED_DISP pid=4495 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.835321 systemd[1]: Started sshd@17-10.0.0.87:22-10.0.0.1:57014.service. Feb 12 19:24:54.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.87:22-10.0.0.1:57014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:54.837180 systemd-logind[1126]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:24:54.837310 systemd[1]: sshd@16-10.0.0.87:22-10.0.0.1:57010.service: Deactivated successfully. Feb 12 19:24:54.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.87:22-10.0.0.1:57010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:54.838094 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:24:54.839310 systemd-logind[1126]: Removed session 17. Feb 12 19:24:54.879000 audit[4506]: USER_ACCT pid=4506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.880827 sshd[4506]: Accepted publickey for core from 10.0.0.1 port 57014 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:54.881000 audit[4506]: CRED_ACQ pid=4506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.881000 audit[4506]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe006e0b0 a2=3 a3=1 items=0 ppid=1 pid=4506 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:54.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:54.882498 sshd[4506]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:54.886174 systemd-logind[1126]: New session 18 of user core. Feb 12 19:24:54.887075 systemd[1]: Started session-18.scope. Feb 12 19:24:54.889000 audit[4506]: USER_START pid=4506 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:54.891000 audit[4509]: CRED_ACQ pid=4509 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:55.695000 audit[4521]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:55.695000 audit[4521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc26a2c40 a2=0 a3=ffff937746c0 items=0 ppid=2163 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:55.695000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:55.702751 sshd[4506]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:55.703000 audit[4506]: USER_END pid=4506 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:55.703000 audit[4506]: CRED_DISP pid=4506 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:55.707915 systemd[1]: Started sshd@18-10.0.0.87:22-10.0.0.1:57016.service. Feb 12 19:24:55.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.87:22-10.0.0.1:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:55.708507 systemd[1]: sshd@17-10.0.0.87:22-10.0.0.1:57014.service: Deactivated successfully. Feb 12 19:24:55.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.87:22-10.0.0.1:57014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:55.709481 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:24:55.700000 audit[4521]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:55.700000 audit[4521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc26a2c40 a2=0 a3=ffff937746c0 items=0 ppid=2163 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:55.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:55.710434 systemd-logind[1126]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:24:55.711577 systemd-logind[1126]: Removed session 18. Feb 12 19:24:55.719000 audit[4526]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:55.719000 audit[4526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc96f04b0 a2=0 a3=ffff9c1716c0 items=0 ppid=2163 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:55.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:55.720000 audit[4526]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:24:55.720000 audit[4526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc96f04b0 a2=0 a3=ffff9c1716c0 items=0 ppid=2163 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:55.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:24:55.746000 audit[4523]: USER_ACCT pid=4523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:55.747261 sshd[4523]: Accepted publickey for core from 10.0.0.1 port 57016 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:55.747000 audit[4523]: CRED_ACQ pid=4523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:55.747000 audit[4523]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd83ae080 a2=3 a3=1 items=0 ppid=1 pid=4523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:55.747000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:55.748833 sshd[4523]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:55.752444 systemd-logind[1126]: New session 19 of user core. Feb 12 19:24:55.753303 systemd[1]: Started session-19.scope. Feb 12 19:24:55.756000 audit[4523]: USER_START pid=4523 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:55.757000 audit[4528]: CRED_ACQ pid=4528 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.047047 sshd[4523]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:56.048000 audit[4523]: USER_END pid=4523 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.048000 audit[4523]: CRED_DISP pid=4523 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.051830 systemd[1]: sshd@18-10.0.0.87:22-10.0.0.1:57016.service: Deactivated successfully. Feb 12 19:24:56.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.87:22-10.0.0.1:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:56.052628 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:24:56.053230 systemd-logind[1126]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:24:56.054884 systemd[1]: Started sshd@19-10.0.0.87:22-10.0.0.1:57032.service. Feb 12 19:24:56.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.87:22-10.0.0.1:57032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:56.055720 systemd-logind[1126]: Removed session 19. Feb 12 19:24:56.095717 sshd[4537]: Accepted publickey for core from 10.0.0.1 port 57032 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:24:56.097116 sshd[4537]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:24:56.094000 audit[4537]: USER_ACCT pid=4537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.096000 audit[4537]: CRED_ACQ pid=4537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.096000 audit[4537]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0e2e8d0 a2=3 a3=1 items=0 ppid=1 pid=4537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:24:56.096000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:24:56.108153 systemd-logind[1126]: New session 20 of user core. Feb 12 19:24:56.109171 systemd[1]: Started session-20.scope. Feb 12 19:24:56.120000 audit[4537]: USER_START pid=4537 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.123000 audit[4539]: CRED_ACQ pid=4539 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.255674 sshd[4537]: pam_unix(sshd:session): session closed for user core Feb 12 19:24:56.256000 audit[4537]: USER_END pid=4537 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.256000 audit[4537]: CRED_DISP pid=4537 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:24:56.259164 systemd[1]: sshd@19-10.0.0.87:22-10.0.0.1:57032.service: Deactivated successfully. Feb 12 19:24:56.260209 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:24:56.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.87:22-10.0.0.1:57032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:24:56.261252 systemd-logind[1126]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:24:56.262427 systemd-logind[1126]: Removed session 20. Feb 12 19:25:00.784000 audit[4573]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:00.785813 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:25:00.785895 kernel: audit: type=1325 audit(1707765900.784:1446): table=filter:117 family=2 entries=20 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:00.784000 audit[4573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffccd94e90 a2=0 a3=ffffbbfd66c0 items=0 ppid=2163 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:00.790435 kernel: audit: type=1300 audit(1707765900.784:1446): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffccd94e90 a2=0 a3=ffffbbfd66c0 items=0 ppid=2163 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:00.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:00.792574 kernel: audit: type=1327 audit(1707765900.784:1446): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:00.791000 audit[4573]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:00.791000 audit[4573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffccd94e90 a2=0 a3=ffffbbfd66c0 items=0 ppid=2163 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:00.798915 kernel: audit: type=1325 audit(1707765900.791:1447): table=nat:118 family=2 entries=104 op=nft_register_chain pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:00.799009 kernel: audit: type=1300 audit(1707765900.791:1447): arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffccd94e90 a2=0 a3=ffffbbfd66c0 items=0 ppid=2163 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:00.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:00.800909 kernel: audit: type=1327 audit(1707765900.791:1447): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:01.261110 systemd[1]: Started sshd@20-10.0.0.87:22-10.0.0.1:57046.service. Feb 12 19:25:01.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.87:22-10.0.0.1:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:01.264678 kernel: audit: type=1130 audit(1707765901.260:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.87:22-10.0.0.1:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:01.302527 kernel: audit: type=1101 audit(1707765901.295:1449): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.302648 kernel: audit: type=1103 audit(1707765901.296:1450): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.302688 kernel: audit: type=1006 audit(1707765901.296:1451): pid=4576 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 19:25:01.295000 audit[4576]: USER_ACCT pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.296000 audit[4576]: CRED_ACQ pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.297831 sshd[4576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:25:01.303064 sshd[4576]: Accepted publickey for core from 10.0.0.1 port 57046 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:25:01.296000 audit[4576]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb3c88d0 a2=3 a3=1 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:01.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:25:01.306552 systemd-logind[1126]: New session 21 of user core. Feb 12 19:25:01.307123 systemd[1]: Started session-21.scope. Feb 12 19:25:01.310000 audit[4576]: USER_START pid=4576 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.312000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.427642 sshd[4576]: pam_unix(sshd:session): session closed for user core Feb 12 19:25:01.428000 audit[4576]: USER_END pid=4576 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.428000 audit[4576]: CRED_DISP pid=4576 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:01.431025 systemd[1]: sshd@20-10.0.0.87:22-10.0.0.1:57046.service: Deactivated successfully. Feb 12 19:25:01.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.87:22-10.0.0.1:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:01.431829 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:25:01.432387 systemd-logind[1126]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:25:01.433399 systemd-logind[1126]: Removed session 21. Feb 12 19:25:01.959454 kubelet[2016]: I0212 19:25:01.959410 2016 topology_manager.go:215] "Topology Admit Handler" podUID="f130a22a-b52d-409d-85e3-06ceedf4bd1a" podNamespace="calico-apiserver" podName="calico-apiserver-85bdc96764-bc6r7" Feb 12 19:25:01.965470 systemd[1]: Created slice kubepods-besteffort-podf130a22a_b52d_409d_85e3_06ceedf4bd1a.slice. Feb 12 19:25:01.967000 audit[4589]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:01.967000 audit[4589]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff8803840 a2=0 a3=ffff9d06c6c0 items=0 ppid=2163 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:01.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:01.974000 audit[4589]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:01.974000 audit[4589]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=fffff8803840 a2=0 a3=ffff9d06c6c0 items=0 ppid=2163 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:01.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:01.987000 audit[4591]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:01.987000 audit[4591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe0e9b7f0 a2=0 a3=ffff9c8906c0 items=0 ppid=2163 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:01.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:01.988000 audit[4591]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:01.988000 audit[4591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffe0e9b7f0 a2=0 a3=ffff9c8906c0 items=0 ppid=2163 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:01.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:02.030915 kubelet[2016]: I0212 19:25:02.030875 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f130a22a-b52d-409d-85e3-06ceedf4bd1a-calico-apiserver-certs\") pod \"calico-apiserver-85bdc96764-bc6r7\" (UID: \"f130a22a-b52d-409d-85e3-06ceedf4bd1a\") " pod="calico-apiserver/calico-apiserver-85bdc96764-bc6r7" Feb 12 19:25:02.031175 kubelet[2016]: I0212 19:25:02.031154 2016 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pr46h\" (UniqueName: \"kubernetes.io/projected/f130a22a-b52d-409d-85e3-06ceedf4bd1a-kube-api-access-pr46h\") pod \"calico-apiserver-85bdc96764-bc6r7\" (UID: \"f130a22a-b52d-409d-85e3-06ceedf4bd1a\") " pod="calico-apiserver/calico-apiserver-85bdc96764-bc6r7" Feb 12 19:25:02.271568 env[1138]: time="2024-02-12T19:25:02.271450596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85bdc96764-bc6r7,Uid:f130a22a-b52d-409d-85e3-06ceedf4bd1a,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:25:02.419214 systemd-networkd[1045]: cali89c8b467b0e: Link UP Feb 12 19:25:02.420799 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:25:02.420865 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali89c8b467b0e: link becomes ready Feb 12 19:25:02.420595 systemd-networkd[1045]: cali89c8b467b0e: Gained carrier Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.323 [INFO][4594] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0 calico-apiserver-85bdc96764- calico-apiserver f130a22a-b52d-409d-85e3-06ceedf4bd1a 1102 0 2024-02-12 19:25:01 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85bdc96764 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-85bdc96764-bc6r7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali89c8b467b0e [] []}} ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.323 [INFO][4594] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.364 [INFO][4610] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" HandleID="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Workload="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.379 [INFO][4610] ipam_plugin.go 268: Auto assigning IP ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" HandleID="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Workload="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029da10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-85bdc96764-bc6r7", "timestamp":"2024-02-12 19:25:02.364260531 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.379 [INFO][4610] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.379 [INFO][4610] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.379 [INFO][4610] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.387 [INFO][4610] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.393 [INFO][4610] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.397 [INFO][4610] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.399 [INFO][4610] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.401 [INFO][4610] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.401 [INFO][4610] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.403 [INFO][4610] ipam.go 1682: Creating new handle: k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46 Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.408 [INFO][4610] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.414 [INFO][4610] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.415 [INFO][4610] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" host="localhost" Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.415 [INFO][4610] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:25:02.434204 env[1138]: 2024-02-12 19:25:02.415 [INFO][4610] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" HandleID="k8s-pod-network.8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Workload="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.434828 env[1138]: 2024-02-12 19:25:02.417 [INFO][4594] k8s.go 385: Populated endpoint ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0", GenerateName:"calico-apiserver-85bdc96764-", Namespace:"calico-apiserver", SelfLink:"", UID:"f130a22a-b52d-409d-85e3-06ceedf4bd1a", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 25, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85bdc96764", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-85bdc96764-bc6r7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89c8b467b0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:25:02.434828 env[1138]: 2024-02-12 19:25:02.417 [INFO][4594] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.434828 env[1138]: 2024-02-12 19:25:02.417 [INFO][4594] dataplane_linux.go 68: Setting the host side veth name to cali89c8b467b0e ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.434828 env[1138]: 2024-02-12 19:25:02.420 [INFO][4594] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.434828 env[1138]: 2024-02-12 19:25:02.421 [INFO][4594] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0", GenerateName:"calico-apiserver-85bdc96764-", Namespace:"calico-apiserver", SelfLink:"", UID:"f130a22a-b52d-409d-85e3-06ceedf4bd1a", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 25, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85bdc96764", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46", Pod:"calico-apiserver-85bdc96764-bc6r7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89c8b467b0e", MAC:"1e:85:a0:a2:5c:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:25:02.434828 env[1138]: 2024-02-12 19:25:02.431 [INFO][4594] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46" Namespace="calico-apiserver" Pod="calico-apiserver-85bdc96764-bc6r7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85bdc96764--bc6r7-eth0" Feb 12 19:25:02.451756 env[1138]: time="2024-02-12T19:25:02.451493193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:25:02.451756 env[1138]: time="2024-02-12T19:25:02.451538753Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:25:02.451756 env[1138]: time="2024-02-12T19:25:02.451551954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:25:02.451756 env[1138]: time="2024-02-12T19:25:02.451710114Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46 pid=4643 runtime=io.containerd.runc.v2 Feb 12 19:25:02.468168 systemd[1]: Started cri-containerd-8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46.scope. Feb 12 19:25:02.477000 audit[4666]: NETFILTER_CFG table=filter:123 family=2 entries=65 op=nft_register_chain pid=4666 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:25:02.477000 audit[4666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32144 a0=3 a1=ffffd801cd40 a2=0 a3=ffff7fa17fa8 items=0 ppid=3256 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:02.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit: BPF prog-id=182 op=LOAD Feb 12 19:25:02.491000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.491000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4643 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:02.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303235666337643034353164343761313737623631306164363762 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4643 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:02.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303235666337643034353164343761313737623631306164363762 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.492000 audit: BPF prog-id=183 op=LOAD Feb 12 19:25:02.492000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4643 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:02.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303235666337643034353164343761313737623631306164363762 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit: BPF prog-id=184 op=LOAD Feb 12 19:25:02.493000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4643 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:02.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303235666337643034353164343761313737623631306164363762 Feb 12 19:25:02.493000 audit: BPF prog-id=184 op=UNLOAD Feb 12 19:25:02.493000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:02.493000 audit: BPF prog-id=185 op=LOAD Feb 12 19:25:02.493000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4643 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:02.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303235666337643034353164343761313737623631306164363762 Feb 12 19:25:02.495519 systemd-resolved[1087]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:25:02.511008 env[1138]: time="2024-02-12T19:25:02.510939896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85bdc96764-bc6r7,Uid:f130a22a-b52d-409d-85e3-06ceedf4bd1a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46\"" Feb 12 19:25:02.517341 env[1138]: time="2024-02-12T19:25:02.517298452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:25:04.292799 systemd-networkd[1045]: cali89c8b467b0e: Gained IPv6LL Feb 12 19:25:04.957593 env[1138]: time="2024-02-12T19:25:04.957539942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:25:04.960665 env[1138]: time="2024-02-12T19:25:04.960614279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:25:04.962620 env[1138]: time="2024-02-12T19:25:04.962581169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:25:04.964020 env[1138]: time="2024-02-12T19:25:04.963985937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:25:04.966969 env[1138]: time="2024-02-12T19:25:04.966922033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:25:04.975671 env[1138]: time="2024-02-12T19:25:04.975614320Z" level=info msg="CreateContainer within sandbox \"8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:25:04.991571 env[1138]: time="2024-02-12T19:25:04.991446047Z" level=info msg="CreateContainer within sandbox \"8c025fc7d0451d47a177b610ad67bfabc30276e2dc5834f8de6425e41a366e46\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4dbc5553725ada5f90a244349a5e4bbf2d8962e5e6ded459e9ebfcf7dfee6d63\"" Feb 12 19:25:04.992696 env[1138]: time="2024-02-12T19:25:04.992652893Z" level=info msg="StartContainer for \"4dbc5553725ada5f90a244349a5e4bbf2d8962e5e6ded459e9ebfcf7dfee6d63\"" Feb 12 19:25:05.020082 systemd[1]: run-containerd-runc-k8s.io-4dbc5553725ada5f90a244349a5e4bbf2d8962e5e6ded459e9ebfcf7dfee6d63-runc.lluZ40.mount: Deactivated successfully. Feb 12 19:25:05.025360 systemd[1]: Started cri-containerd-4dbc5553725ada5f90a244349a5e4bbf2d8962e5e6ded459e9ebfcf7dfee6d63.scope. Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.055000 audit: BPF prog-id=186 op=LOAD Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4643 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626335353533373235616461356639306132343433343961356534 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4643 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626335353533373235616461356639306132343433343961356534 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit: BPF prog-id=187 op=LOAD Feb 12 19:25:05.058000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4643 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626335353533373235616461356639306132343433343961356534 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit: BPF prog-id=188 op=LOAD Feb 12 19:25:05.058000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4643 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626335353533373235616461356639306132343433343961356534 Feb 12 19:25:05.058000 audit: BPF prog-id=188 op=UNLOAD Feb 12 19:25:05.058000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:25:05.058000 audit: BPF prog-id=189 op=LOAD Feb 12 19:25:05.058000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4643 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626335353533373235616461356639306132343433343961356534 Feb 12 19:25:05.082691 env[1138]: time="2024-02-12T19:25:05.081066924Z" level=info msg="StartContainer for \"4dbc5553725ada5f90a244349a5e4bbf2d8962e5e6ded459e9ebfcf7dfee6d63\" returns successfully" Feb 12 19:25:05.809000 audit[4720]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:05.813045 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 12 19:25:05.813210 kernel: audit: type=1325 audit(1707765905.809:1498): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:05.813363 kernel: audit: type=1300 audit(1707765905.809:1498): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd9830d80 a2=0 a3=ffff988c26c0 items=0 ppid=2163 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.809000 audit[4720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd9830d80 a2=0 a3=ffff988c26c0 items=0 ppid=2163 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.816243 kernel: audit: type=1327 audit(1707765905.809:1498): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:05.809000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:05.811000 audit[4720]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:05.811000 audit[4720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffd9830d80 a2=0 a3=ffff988c26c0 items=0 ppid=2163 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.827835 kernel: audit: type=1325 audit(1707765905.811:1499): table=nat:125 family=2 entries=44 op=nft_register_rule pid=4720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:05.827925 kernel: audit: type=1300 audit(1707765905.811:1499): arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffd9830d80 a2=0 a3=ffff988c26c0 items=0 ppid=2163 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:05.827978 kernel: audit: type=1327 audit(1707765905.811:1499): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:05.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:05.830369 kubelet[2016]: E0212 19:25:05.830344 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:25:06.091000 audit[4744]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:06.094683 kernel: audit: type=1325 audit(1707765906.091:1500): table=filter:126 family=2 entries=10 op=nft_register_rule pid=4744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:06.094779 kernel: audit: type=1300 audit(1707765906.091:1500): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe785aa90 a2=0 a3=ffffb9fce6c0 items=0 ppid=2163 pid=4744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:06.091000 audit[4744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe785aa90 a2=0 a3=ffffb9fce6c0 items=0 ppid=2163 pid=4744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:06.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:06.099181 kernel: audit: type=1327 audit(1707765906.091:1500): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:06.093000 audit[4744]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:06.105681 kernel: audit: type=1325 audit(1707765906.093:1501): table=nat:127 family=2 entries=44 op=nft_register_rule pid=4744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:25:06.093000 audit[4744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffe785aa90 a2=0 a3=ffffb9fce6c0 items=0 ppid=2163 pid=4744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:06.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:25:06.241000 audit[4698]: AVC avc: denied { watch } for pid=4698 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_25_02.322887820/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c469,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c469,c643 tclass=file permissive=0 Feb 12 19:25:06.241000 audit[4698]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c14bc0 a2=fc6 a3=0 items=0 ppid=4643 pid=4698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c469,c643 key=(null) Feb 12 19:25:06.241000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:25:06.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.87:22-10.0.0.1:38870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:06.432523 systemd[1]: Started sshd@21-10.0.0.87:22-10.0.0.1:38870.service. Feb 12 19:25:06.472000 audit[4747]: USER_ACCT pid=4747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:06.473447 sshd[4747]: Accepted publickey for core from 10.0.0.1 port 38870 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:25:06.473000 audit[4747]: CRED_ACQ pid=4747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:06.473000 audit[4747]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5e7d630 a2=3 a3=1 items=0 ppid=1 pid=4747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:06.473000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:25:06.474676 sshd[4747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:25:06.478109 systemd-logind[1126]: New session 22 of user core. Feb 12 19:25:06.478984 systemd[1]: Started session-22.scope. Feb 12 19:25:06.482000 audit[4747]: USER_START pid=4747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:06.483000 audit[4749]: CRED_ACQ pid=4749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:06.624677 sshd[4747]: pam_unix(sshd:session): session closed for user core Feb 12 19:25:06.624000 audit[4747]: USER_END pid=4747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:06.625000 audit[4747]: CRED_DISP pid=4747 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:06.627486 systemd[1]: sshd@21-10.0.0.87:22-10.0.0.1:38870.service: Deactivated successfully. Feb 12 19:25:06.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.87:22-10.0.0.1:38870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:06.628290 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:25:06.628824 systemd-logind[1126]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:25:06.629476 systemd-logind[1126]: Removed session 22. Feb 12 19:25:06.830417 kubelet[2016]: E0212 19:25:06.830378 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:25:11.629368 systemd[1]: Started sshd@22-10.0.0.87:22-10.0.0.1:38876.service. Feb 12 19:25:11.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.87:22-10.0.0.1:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:11.630152 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 12 19:25:11.630214 kernel: audit: type=1130 audit(1707765911.628:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.87:22-10.0.0.1:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:11.665000 audit[4770]: USER_ACCT pid=4770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.666514 sshd[4770]: Accepted publickey for core from 10.0.0.1 port 38876 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:25:11.668101 sshd[4770]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:25:11.667000 audit[4770]: CRED_ACQ pid=4770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.671209 kernel: audit: type=1101 audit(1707765911.665:1513): pid=4770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.671283 kernel: audit: type=1103 audit(1707765911.667:1514): pid=4770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.672070 systemd-logind[1126]: New session 23 of user core. Feb 12 19:25:11.672616 systemd[1]: Started session-23.scope. Feb 12 19:25:11.673217 kernel: audit: type=1006 audit(1707765911.667:1515): pid=4770 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 19:25:11.673270 kernel: audit: type=1300 audit(1707765911.667:1515): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe887f470 a2=3 a3=1 items=0 ppid=1 pid=4770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:11.667000 audit[4770]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe887f470 a2=3 a3=1 items=0 ppid=1 pid=4770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:11.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:25:11.676682 kernel: audit: type=1327 audit(1707765911.667:1515): proctitle=737368643A20636F7265205B707269765D Feb 12 19:25:11.678000 audit[4770]: USER_START pid=4770 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.680000 audit[4772]: CRED_ACQ pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.684268 kernel: audit: type=1105 audit(1707765911.678:1516): pid=4770 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.684335 kernel: audit: type=1103 audit(1707765911.680:1517): pid=4772 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.827332 sshd[4770]: pam_unix(sshd:session): session closed for user core Feb 12 19:25:11.827000 audit[4770]: USER_END pid=4770 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.827000 audit[4770]: CRED_DISP pid=4770 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.834434 kernel: audit: type=1106 audit(1707765911.827:1518): pid=4770 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.834546 kernel: audit: type=1104 audit(1707765911.827:1519): pid=4770 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:11.838083 systemd[1]: sshd@22-10.0.0.87:22-10.0.0.1:38876.service: Deactivated successfully. Feb 12 19:25:11.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.87:22-10.0.0.1:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:11.838965 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:25:11.840074 systemd-logind[1126]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:25:11.841085 systemd-logind[1126]: Removed session 23. Feb 12 19:25:16.830950 kubelet[2016]: E0212 19:25:16.830917 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:25:16.831374 systemd[1]: Started sshd@23-10.0.0.87:22-10.0.0.1:49172.service. Feb 12 19:25:16.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.87:22-10.0.0.1:49172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:16.834772 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:25:16.834891 kernel: audit: type=1130 audit(1707765916.830:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.87:22-10.0.0.1:49172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:16.875000 audit[4786]: USER_ACCT pid=4786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.876016 sshd[4786]: Accepted publickey for core from 10.0.0.1 port 49172 ssh2: RSA SHA256:0q7ITIIsVkfhf6t5T8C/3bWLc/a3iVJf1KwyHhJJ+LU Feb 12 19:25:16.877168 sshd[4786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:25:16.876000 audit[4786]: CRED_ACQ pid=4786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.881405 kernel: audit: type=1101 audit(1707765916.875:1522): pid=4786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.881478 kernel: audit: type=1103 audit(1707765916.876:1523): pid=4786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.883090 kernel: audit: type=1006 audit(1707765916.876:1524): pid=4786 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:25:16.876000 audit[4786]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1b62910 a2=3 a3=1 items=0 ppid=1 pid=4786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:16.885935 kernel: audit: type=1300 audit(1707765916.876:1524): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1b62910 a2=3 a3=1 items=0 ppid=1 pid=4786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:25:16.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:25:16.887147 kernel: audit: type=1327 audit(1707765916.876:1524): proctitle=737368643A20636F7265205B707269765D Feb 12 19:25:16.888326 systemd-logind[1126]: New session 24 of user core. Feb 12 19:25:16.889235 systemd[1]: Started session-24.scope. Feb 12 19:25:16.892000 audit[4786]: USER_START pid=4786 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.894000 audit[4788]: CRED_ACQ pid=4788 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.898983 kernel: audit: type=1105 audit(1707765916.892:1525): pid=4786 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:16.899277 kernel: audit: type=1103 audit(1707765916.894:1526): pid=4788 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:17.031274 sshd[4786]: pam_unix(sshd:session): session closed for user core Feb 12 19:25:17.032000 audit[4786]: USER_END pid=4786 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:17.034873 systemd[1]: sshd@23-10.0.0.87:22-10.0.0.1:49172.service: Deactivated successfully. Feb 12 19:25:17.035718 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:25:17.032000 audit[4786]: CRED_DISP pid=4786 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:17.038195 systemd-logind[1126]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:25:17.038486 kernel: audit: type=1106 audit(1707765917.032:1527): pid=4786 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:17.038539 kernel: audit: type=1104 audit(1707765917.032:1528): pid=4786 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:25:17.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.87:22-10.0.0.1:49172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:25:17.039256 systemd-logind[1126]: Removed session 24. Feb 12 19:25:17.832837 kubelet[2016]: E0212 19:25:17.832790 2016 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"