Feb 12 19:39:54.729764 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:39:54.729784 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:39:54.729792 kernel: efi: EFI v2.70 by EDK II Feb 12 19:39:54.729798 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Feb 12 19:39:54.729803 kernel: random: crng init done Feb 12 19:39:54.729809 kernel: ACPI: Early table checksum verification disabled Feb 12 19:39:54.729815 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Feb 12 19:39:54.729822 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:39:54.729828 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729833 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729839 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729845 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729850 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729865 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729889 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729896 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729902 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:54.729908 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Feb 12 19:39:54.729914 kernel: NUMA: Failed to initialise from firmware Feb 12 19:39:54.729920 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:39:54.729926 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Feb 12 19:39:54.729932 kernel: Zone ranges: Feb 12 19:39:54.729938 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:39:54.729945 kernel: DMA32 empty Feb 12 19:39:54.729951 kernel: Normal empty Feb 12 19:39:54.729957 kernel: Movable zone start for each node Feb 12 19:39:54.729963 kernel: Early memory node ranges Feb 12 19:39:54.729969 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Feb 12 19:39:54.729975 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Feb 12 19:39:54.729981 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Feb 12 19:39:54.729987 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Feb 12 19:39:54.729993 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Feb 12 19:39:54.729999 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Feb 12 19:39:54.730005 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Feb 12 19:39:54.730011 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Feb 12 19:39:54.730018 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Feb 12 19:39:54.730024 kernel: psci: probing for conduit method from ACPI. Feb 12 19:39:54.730030 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:39:54.730036 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:39:54.730042 kernel: psci: Trusted OS migration not required Feb 12 19:39:54.730051 kernel: psci: SMC Calling Convention v1.1 Feb 12 19:39:54.730057 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Feb 12 19:39:54.730065 kernel: ACPI: SRAT not present Feb 12 19:39:54.730072 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:39:54.730078 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:39:54.730084 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Feb 12 19:39:54.730091 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:39:54.730097 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:39:54.730103 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:39:54.730110 kernel: CPU features: detected: Spectre-v4 Feb 12 19:39:54.730116 kernel: CPU features: detected: Spectre-BHB Feb 12 19:39:54.730123 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:39:54.730130 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:39:54.730136 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:39:54.730142 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Feb 12 19:39:54.730149 kernel: Policy zone: DMA Feb 12 19:39:54.730156 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:39:54.730163 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:39:54.730169 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:39:54.730176 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:39:54.730182 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:39:54.730189 kernel: Memory: 2459148K/2572288K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 113140K reserved, 0K cma-reserved) Feb 12 19:39:54.730196 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:39:54.730203 kernel: trace event string verifier disabled Feb 12 19:39:54.730209 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:39:54.730216 kernel: rcu: RCU event tracing is enabled. Feb 12 19:39:54.730222 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:39:54.730229 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:39:54.730235 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:39:54.730242 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:39:54.730248 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:39:54.730255 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:39:54.730261 kernel: GICv3: 256 SPIs implemented Feb 12 19:39:54.730269 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:39:54.730275 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:39:54.730281 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:39:54.730287 kernel: GICv3: 16 PPIs implemented Feb 12 19:39:54.730294 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Feb 12 19:39:54.730300 kernel: ACPI: SRAT not present Feb 12 19:39:54.730306 kernel: ITS [mem 0x08080000-0x0809ffff] Feb 12 19:39:54.730312 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Feb 12 19:39:54.730319 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Feb 12 19:39:54.730326 kernel: GICv3: using LPI property table @0x00000000400d0000 Feb 12 19:39:54.730332 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Feb 12 19:39:54.730338 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:39:54.730346 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:39:54.730352 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:39:54.730359 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:39:54.730365 kernel: arm-pv: using stolen time PV Feb 12 19:39:54.730377 kernel: Console: colour dummy device 80x25 Feb 12 19:39:54.730384 kernel: ACPI: Core revision 20210730 Feb 12 19:39:54.730391 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:39:54.730398 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:39:54.730404 kernel: LSM: Security Framework initializing Feb 12 19:39:54.730410 kernel: SELinux: Initializing. Feb 12 19:39:54.730418 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:39:54.730425 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:39:54.730431 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:39:54.730438 kernel: Platform MSI: ITS@0x8080000 domain created Feb 12 19:39:54.730444 kernel: PCI/MSI: ITS@0x8080000 domain created Feb 12 19:39:54.730451 kernel: Remapping and enabling EFI services. Feb 12 19:39:54.730457 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:39:54.730464 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:39:54.730470 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Feb 12 19:39:54.730478 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Feb 12 19:39:54.730485 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:39:54.730491 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:39:54.730498 kernel: Detected PIPT I-cache on CPU2 Feb 12 19:39:54.730504 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Feb 12 19:39:54.730511 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Feb 12 19:39:54.730518 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:39:54.730524 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Feb 12 19:39:54.730530 kernel: Detected PIPT I-cache on CPU3 Feb 12 19:39:54.730537 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Feb 12 19:39:54.730544 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Feb 12 19:39:54.730551 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:39:54.730557 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Feb 12 19:39:54.730564 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:39:54.730574 kernel: SMP: Total of 4 processors activated. Feb 12 19:39:54.730582 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:39:54.730589 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:39:54.730596 kernel: CPU features: detected: Common not Private translations Feb 12 19:39:54.730603 kernel: CPU features: detected: CRC32 instructions Feb 12 19:39:54.730609 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:39:54.730616 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:39:54.730623 kernel: CPU features: detected: Privileged Access Never Feb 12 19:39:54.730631 kernel: CPU features: detected: RAS Extension Support Feb 12 19:39:54.730638 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Feb 12 19:39:54.730645 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:39:54.730651 kernel: alternatives: patching kernel code Feb 12 19:39:54.730660 kernel: devtmpfs: initialized Feb 12 19:39:54.730666 kernel: KASLR enabled Feb 12 19:39:54.730674 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:39:54.730680 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:39:54.730687 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:39:54.730694 kernel: SMBIOS 3.0.0 present. Feb 12 19:39:54.730701 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Feb 12 19:39:54.730708 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:39:54.730715 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:39:54.730721 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:39:54.730730 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:39:54.730736 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:39:54.730743 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Feb 12 19:39:54.730750 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:39:54.730757 kernel: cpuidle: using governor menu Feb 12 19:39:54.730764 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:39:54.730770 kernel: ASID allocator initialised with 32768 entries Feb 12 19:39:54.730777 kernel: ACPI: bus type PCI registered Feb 12 19:39:54.730784 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:39:54.730792 kernel: Serial: AMBA PL011 UART driver Feb 12 19:39:54.730799 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:39:54.730806 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:39:54.730813 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:39:54.730819 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:39:54.730826 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:39:54.730833 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:39:54.730840 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:39:54.730847 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:39:54.730860 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:39:54.730868 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:39:54.730881 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:39:54.730888 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:39:54.730895 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:39:54.730901 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:39:54.730908 kernel: ACPI: Interpreter enabled Feb 12 19:39:54.730915 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:39:54.730922 kernel: ACPI: MCFG table detected, 1 entries Feb 12 19:39:54.730930 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:39:54.730937 kernel: printk: console [ttyAMA0] enabled Feb 12 19:39:54.730944 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:39:54.731072 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:39:54.731140 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 12 19:39:54.731202 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 12 19:39:54.731264 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Feb 12 19:39:54.731328 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Feb 12 19:39:54.731337 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Feb 12 19:39:54.731344 kernel: PCI host bridge to bus 0000:00 Feb 12 19:39:54.731412 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Feb 12 19:39:54.731471 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 12 19:39:54.731529 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Feb 12 19:39:54.731590 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:39:54.731693 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Feb 12 19:39:54.731773 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:39:54.731839 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Feb 12 19:39:54.731924 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Feb 12 19:39:54.731991 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:39:54.732054 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Feb 12 19:39:54.732165 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Feb 12 19:39:54.732240 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Feb 12 19:39:54.732298 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Feb 12 19:39:54.732352 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 12 19:39:54.732408 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Feb 12 19:39:54.732417 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 12 19:39:54.732424 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 12 19:39:54.732431 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 12 19:39:54.732440 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 12 19:39:54.732448 kernel: iommu: Default domain type: Translated Feb 12 19:39:54.732455 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:39:54.732461 kernel: vgaarb: loaded Feb 12 19:39:54.732468 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:39:54.732475 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:39:54.732483 kernel: PTP clock support registered Feb 12 19:39:54.732490 kernel: Registered efivars operations Feb 12 19:39:54.732497 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:39:54.732505 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:39:54.732512 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:39:54.732519 kernel: pnp: PnP ACPI init Feb 12 19:39:54.732587 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Feb 12 19:39:54.732597 kernel: pnp: PnP ACPI: found 1 devices Feb 12 19:39:54.732604 kernel: NET: Registered PF_INET protocol family Feb 12 19:39:54.732611 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:39:54.732618 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:39:54.732625 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:39:54.732634 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:39:54.732641 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:39:54.732648 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:39:54.732655 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:39:54.732662 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:39:54.732668 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:39:54.732675 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:39:54.732682 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Feb 12 19:39:54.732690 kernel: kvm [1]: HYP mode not available Feb 12 19:39:54.732697 kernel: Initialise system trusted keyrings Feb 12 19:39:54.732704 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:39:54.732711 kernel: Key type asymmetric registered Feb 12 19:39:54.732717 kernel: Asymmetric key parser 'x509' registered Feb 12 19:39:54.732724 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:39:54.732731 kernel: io scheduler mq-deadline registered Feb 12 19:39:54.732738 kernel: io scheduler kyber registered Feb 12 19:39:54.732744 kernel: io scheduler bfq registered Feb 12 19:39:54.732751 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 12 19:39:54.732759 kernel: ACPI: button: Power Button [PWRB] Feb 12 19:39:54.732767 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 12 19:39:54.732828 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Feb 12 19:39:54.732837 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:39:54.732844 kernel: thunder_xcv, ver 1.0 Feb 12 19:39:54.732851 kernel: thunder_bgx, ver 1.0 Feb 12 19:39:54.732918 kernel: nicpf, ver 1.0 Feb 12 19:39:54.732925 kernel: nicvf, ver 1.0 Feb 12 19:39:54.733019 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:39:54.733085 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:39:54 UTC (1707766794) Feb 12 19:39:54.733094 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:39:54.733101 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:39:54.733108 kernel: Segment Routing with IPv6 Feb 12 19:39:54.733115 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:39:54.733122 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:39:54.733129 kernel: Key type dns_resolver registered Feb 12 19:39:54.733136 kernel: registered taskstats version 1 Feb 12 19:39:54.733145 kernel: Loading compiled-in X.509 certificates Feb 12 19:39:54.733152 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:39:54.733159 kernel: Key type .fscrypt registered Feb 12 19:39:54.733166 kernel: Key type fscrypt-provisioning registered Feb 12 19:39:54.733173 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:39:54.733180 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:39:54.733186 kernel: ima: No architecture policies found Feb 12 19:39:54.733193 kernel: Freeing unused kernel memory: 34688K Feb 12 19:39:54.733201 kernel: Run /init as init process Feb 12 19:39:54.733208 kernel: with arguments: Feb 12 19:39:54.733215 kernel: /init Feb 12 19:39:54.733222 kernel: with environment: Feb 12 19:39:54.733229 kernel: HOME=/ Feb 12 19:39:54.733235 kernel: TERM=linux Feb 12 19:39:54.733242 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:39:54.733250 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:39:54.733259 systemd[1]: Detected virtualization kvm. Feb 12 19:39:54.733268 systemd[1]: Detected architecture arm64. Feb 12 19:39:54.733275 systemd[1]: Running in initrd. Feb 12 19:39:54.733283 systemd[1]: No hostname configured, using default hostname. Feb 12 19:39:54.733290 systemd[1]: Hostname set to . Feb 12 19:39:54.733298 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:39:54.733305 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:39:54.733312 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:39:54.733320 systemd[1]: Reached target cryptsetup.target. Feb 12 19:39:54.733328 systemd[1]: Reached target paths.target. Feb 12 19:39:54.733336 systemd[1]: Reached target slices.target. Feb 12 19:39:54.733343 systemd[1]: Reached target swap.target. Feb 12 19:39:54.733350 systemd[1]: Reached target timers.target. Feb 12 19:39:54.733358 systemd[1]: Listening on iscsid.socket. Feb 12 19:39:54.733365 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:39:54.733372 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:39:54.733381 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:39:54.733389 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:39:54.733396 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:39:54.733404 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:39:54.733411 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:39:54.733419 systemd[1]: Reached target sockets.target. Feb 12 19:39:54.733426 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:39:54.733434 systemd[1]: Finished network-cleanup.service. Feb 12 19:39:54.733441 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:39:54.733450 systemd[1]: Starting systemd-journald.service... Feb 12 19:39:54.733457 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:39:54.733465 systemd[1]: Starting systemd-resolved.service... Feb 12 19:39:54.733473 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:39:54.733480 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:39:54.733487 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:39:54.733495 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:39:54.733509 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:39:54.733517 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:39:54.733526 kernel: audit: type=1130 audit(1707766794.730:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.733533 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:39:54.733544 systemd-journald[289]: Journal started Feb 12 19:39:54.733585 systemd-journald[289]: Runtime Journal (/run/log/journal/c5bc6057651e4bbe92b3d03ace7dfa50) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:39:54.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.722769 systemd-modules-load[290]: Inserted module 'overlay' Feb 12 19:39:54.736742 systemd[1]: Started systemd-journald.service. Feb 12 19:39:54.737194 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:39:54.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.738882 kernel: audit: type=1130 audit(1707766794.738:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.742176 kernel: Bridge firewalling registered Feb 12 19:39:54.740786 systemd-modules-load[290]: Inserted module 'br_netfilter' Feb 12 19:39:54.750356 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:39:54.751259 kernel: SCSI subsystem initialized Feb 12 19:39:54.750479 systemd-resolved[291]: Positive Trust Anchors: Feb 12 19:39:54.750486 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:39:54.750514 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:39:54.754599 systemd-resolved[291]: Defaulting to hostname 'linux'. Feb 12 19:39:54.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.760961 systemd[1]: Started systemd-resolved.service. Feb 12 19:39:54.766700 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:39:54.766719 kernel: audit: type=1130 audit(1707766794.760:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.766730 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:39:54.766739 kernel: audit: type=1130 audit(1707766794.763:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.766754 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:39:54.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.763294 systemd[1]: Reached target nss-lookup.target. Feb 12 19:39:54.768115 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:39:54.769831 systemd-modules-load[290]: Inserted module 'dm_multipath' Feb 12 19:39:54.770480 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:39:54.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.771944 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:39:54.774762 kernel: audit: type=1130 audit(1707766794.771:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.778570 dracut-cmdline[308]: dracut-dracut-053 Feb 12 19:39:54.780220 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:39:54.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.783199 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:39:54.786262 kernel: audit: type=1130 audit(1707766794.780:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.836890 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:39:54.846907 kernel: iscsi: registered transport (tcp) Feb 12 19:39:54.860891 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:39:54.860903 kernel: QLogic iSCSI HBA Driver Feb 12 19:39:54.895007 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:39:54.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.896458 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:39:54.898729 kernel: audit: type=1130 audit(1707766794.894:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:54.942912 kernel: raid6: neonx8 gen() 13731 MB/s Feb 12 19:39:54.959882 kernel: raid6: neonx8 xor() 10802 MB/s Feb 12 19:39:54.976899 kernel: raid6: neonx4 gen() 13560 MB/s Feb 12 19:39:54.993896 kernel: raid6: neonx4 xor() 11305 MB/s Feb 12 19:39:55.010893 kernel: raid6: neonx2 gen() 12987 MB/s Feb 12 19:39:55.027895 kernel: raid6: neonx2 xor() 10275 MB/s Feb 12 19:39:55.044907 kernel: raid6: neonx1 gen() 10498 MB/s Feb 12 19:39:55.061895 kernel: raid6: neonx1 xor() 8781 MB/s Feb 12 19:39:55.078908 kernel: raid6: int64x8 gen() 6292 MB/s Feb 12 19:39:55.095906 kernel: raid6: int64x8 xor() 3550 MB/s Feb 12 19:39:55.112891 kernel: raid6: int64x4 gen() 7261 MB/s Feb 12 19:39:55.129893 kernel: raid6: int64x4 xor() 3853 MB/s Feb 12 19:39:55.146895 kernel: raid6: int64x2 gen() 6150 MB/s Feb 12 19:39:55.163889 kernel: raid6: int64x2 xor() 3317 MB/s Feb 12 19:39:55.180897 kernel: raid6: int64x1 gen() 5040 MB/s Feb 12 19:39:55.198099 kernel: raid6: int64x1 xor() 2644 MB/s Feb 12 19:39:55.198115 kernel: raid6: using algorithm neonx8 gen() 13731 MB/s Feb 12 19:39:55.198124 kernel: raid6: .... xor() 10802 MB/s, rmw enabled Feb 12 19:39:55.198133 kernel: raid6: using neon recovery algorithm Feb 12 19:39:55.209051 kernel: xor: measuring software checksum speed Feb 12 19:39:55.209069 kernel: 8regs : 17304 MB/sec Feb 12 19:39:55.209885 kernel: 32regs : 20765 MB/sec Feb 12 19:39:55.211039 kernel: arm64_neon : 27978 MB/sec Feb 12 19:39:55.211050 kernel: xor: using function: arm64_neon (27978 MB/sec) Feb 12 19:39:55.266898 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:39:55.276724 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:39:55.280521 kernel: audit: type=1130 audit(1707766795.276:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:55.280540 kernel: audit: type=1334 audit(1707766795.279:10): prog-id=7 op=LOAD Feb 12 19:39:55.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:55.279000 audit: BPF prog-id=7 op=LOAD Feb 12 19:39:55.280000 audit: BPF prog-id=8 op=LOAD Feb 12 19:39:55.280860 systemd[1]: Starting systemd-udevd.service... Feb 12 19:39:55.294674 systemd-udevd[491]: Using default interface naming scheme 'v252'. Feb 12 19:39:55.298000 systemd[1]: Started systemd-udevd.service. Feb 12 19:39:55.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:55.299820 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:39:55.311185 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation Feb 12 19:39:55.349431 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:39:55.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:55.350754 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:39:55.383847 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:39:55.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:55.413913 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:39:55.415934 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:39:55.415960 kernel: GPT:9289727 != 19775487 Feb 12 19:39:55.415970 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:39:55.416886 kernel: GPT:9289727 != 19775487 Feb 12 19:39:55.416909 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:39:55.416919 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:55.427518 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:39:55.430894 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (555) Feb 12 19:39:55.434686 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:39:55.435722 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:39:55.440648 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:39:55.445759 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:39:55.447392 systemd[1]: Starting disk-uuid.service... Feb 12 19:39:55.452899 disk-uuid[568]: Primary Header is updated. Feb 12 19:39:55.452899 disk-uuid[568]: Secondary Entries is updated. Feb 12 19:39:55.452899 disk-uuid[568]: Secondary Header is updated. Feb 12 19:39:55.455250 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:56.466892 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:56.467095 disk-uuid[569]: The operation has completed successfully. Feb 12 19:39:56.487108 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:39:56.487198 systemd[1]: Finished disk-uuid.service. Feb 12 19:39:56.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.492796 systemd[1]: Starting verity-setup.service... Feb 12 19:39:56.505892 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:39:56.526486 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:39:56.528472 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:39:56.530378 systemd[1]: Finished verity-setup.service. Feb 12 19:39:56.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.576564 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:39:56.577834 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:39:56.577388 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:39:56.578034 systemd[1]: Starting ignition-setup.service... Feb 12 19:39:56.580153 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:39:56.585956 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:39:56.585987 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:39:56.586002 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:39:56.593924 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:39:56.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.600266 systemd[1]: Finished ignition-setup.service. Feb 12 19:39:56.601738 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:39:56.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.662299 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:39:56.664000 audit: BPF prog-id=9 op=LOAD Feb 12 19:39:56.666249 systemd[1]: Starting systemd-networkd.service... Feb 12 19:39:56.682665 ignition[661]: Ignition 2.14.0 Feb 12 19:39:56.682675 ignition[661]: Stage: fetch-offline Feb 12 19:39:56.682712 ignition[661]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:39:56.682721 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:39:56.682853 ignition[661]: parsed url from cmdline: "" Feb 12 19:39:56.682856 ignition[661]: no config URL provided Feb 12 19:39:56.682861 ignition[661]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:39:56.682868 ignition[661]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:39:56.682898 ignition[661]: op(1): [started] loading QEMU firmware config module Feb 12 19:39:56.682903 ignition[661]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:39:56.687618 systemd-networkd[744]: lo: Link UP Feb 12 19:39:56.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.686600 ignition[661]: op(1): [finished] loading QEMU firmware config module Feb 12 19:39:56.687622 systemd-networkd[744]: lo: Gained carrier Feb 12 19:39:56.687986 systemd-networkd[744]: Enumeration completed Feb 12 19:39:56.688154 systemd-networkd[744]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:39:56.688267 systemd[1]: Started systemd-networkd.service. Feb 12 19:39:56.689049 systemd-networkd[744]: eth0: Link UP Feb 12 19:39:56.689052 systemd-networkd[744]: eth0: Gained carrier Feb 12 19:39:56.689605 systemd[1]: Reached target network.target. Feb 12 19:39:56.691331 systemd[1]: Starting iscsiuio.service... Feb 12 19:39:56.700133 systemd[1]: Started iscsiuio.service. Feb 12 19:39:56.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.701869 systemd[1]: Starting iscsid.service... Feb 12 19:39:56.704968 iscsid[750]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:39:56.704968 iscsid[750]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:39:56.704968 iscsid[750]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:39:56.704968 iscsid[750]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:39:56.704968 iscsid[750]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:39:56.704968 iscsid[750]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:39:56.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.707786 systemd[1]: Started iscsid.service. Feb 12 19:39:56.710945 systemd-networkd[744]: eth0: DHCPv4 address 10.0.0.3/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:39:56.712540 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:39:56.722511 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:39:56.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.723476 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:39:56.724817 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:39:56.726352 systemd[1]: Reached target remote-fs.target. Feb 12 19:39:56.728272 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:39:56.735563 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:39:56.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.776406 ignition[661]: parsing config with SHA512: d0588fa76095ee95b7ca3718aafbd821e3b1a8dcb18e274992d24083f0e7d82d778564e38dc728c52efacddf1950e7c543cb823424b8d03d1b1502345cef2209 Feb 12 19:39:56.812396 unknown[661]: fetched base config from "system" Feb 12 19:39:56.812407 unknown[661]: fetched user config from "qemu" Feb 12 19:39:56.813192 ignition[661]: fetch-offline: fetch-offline passed Feb 12 19:39:56.813271 ignition[661]: Ignition finished successfully Feb 12 19:39:56.815461 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:39:56.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.816828 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:39:56.817602 systemd[1]: Starting ignition-kargs.service... Feb 12 19:39:56.826185 ignition[766]: Ignition 2.14.0 Feb 12 19:39:56.826195 ignition[766]: Stage: kargs Feb 12 19:39:56.826282 ignition[766]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:39:56.826292 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:39:56.827371 ignition[766]: kargs: kargs passed Feb 12 19:39:56.828708 systemd[1]: Finished ignition-kargs.service. Feb 12 19:39:56.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.827413 ignition[766]: Ignition finished successfully Feb 12 19:39:56.830508 systemd[1]: Starting ignition-disks.service... Feb 12 19:39:56.836371 ignition[772]: Ignition 2.14.0 Feb 12 19:39:56.836380 ignition[772]: Stage: disks Feb 12 19:39:56.836461 ignition[772]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:39:56.836470 ignition[772]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:39:56.837502 ignition[772]: disks: disks passed Feb 12 19:39:56.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.838339 systemd[1]: Finished ignition-disks.service. Feb 12 19:39:56.837543 ignition[772]: Ignition finished successfully Feb 12 19:39:56.839358 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:39:56.840257 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:39:56.841215 systemd[1]: Reached target local-fs.target. Feb 12 19:39:56.842178 systemd[1]: Reached target sysinit.target. Feb 12 19:39:56.843235 systemd[1]: Reached target basic.target. Feb 12 19:39:56.844963 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:39:56.855479 systemd-fsck[780]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:39:56.858750 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:39:56.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.861253 systemd[1]: Mounting sysroot.mount... Feb 12 19:39:56.867896 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:39:56.867785 systemd[1]: Mounted sysroot.mount. Feb 12 19:39:56.868567 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:39:56.870555 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:39:56.871475 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:39:56.871512 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:39:56.871535 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:39:56.873151 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:39:56.874585 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:39:56.878661 initrd-setup-root[790]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:39:56.883542 initrd-setup-root[799]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:39:56.890421 initrd-setup-root[807]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:39:56.893916 initrd-setup-root[815]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:39:56.921169 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:39:56.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.922787 systemd[1]: Starting ignition-mount.service... Feb 12 19:39:56.924146 systemd[1]: Starting sysroot-boot.service... Feb 12 19:39:56.930277 bash[832]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:39:56.939704 ignition[834]: INFO : Ignition 2.14.0 Feb 12 19:39:56.939704 ignition[834]: INFO : Stage: mount Feb 12 19:39:56.942026 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:39:56.942026 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:39:56.942026 ignition[834]: INFO : mount: mount passed Feb 12 19:39:56.942026 ignition[834]: INFO : Ignition finished successfully Feb 12 19:39:56.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:56.942268 systemd[1]: Finished ignition-mount.service. Feb 12 19:39:56.946908 systemd[1]: Finished sysroot-boot.service. Feb 12 19:39:56.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:57.537026 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:39:57.542887 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (843) Feb 12 19:39:57.542915 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:39:57.544015 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:39:57.544038 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:39:57.547177 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:39:57.548644 systemd[1]: Starting ignition-files.service... Feb 12 19:39:57.561846 ignition[863]: INFO : Ignition 2.14.0 Feb 12 19:39:57.561846 ignition[863]: INFO : Stage: files Feb 12 19:39:57.563356 ignition[863]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:39:57.563356 ignition[863]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:39:57.563356 ignition[863]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:39:57.567220 ignition[863]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:39:57.567220 ignition[863]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:39:57.570697 ignition[863]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:39:57.572008 ignition[863]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:39:57.572008 ignition[863]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:39:57.572008 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 12 19:39:57.572008 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 12 19:39:57.571376 unknown[863]: wrote ssh authorized keys file for user: core Feb 12 19:39:57.883182 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:39:58.070169 ignition[863]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 12 19:39:58.072921 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 12 19:39:58.072921 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 12 19:39:58.072921 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:39:58.313972 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:39:58.335975 systemd-networkd[744]: eth0: Gained IPv6LL Feb 12 19:39:58.432252 ignition[863]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 12 19:39:58.435144 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 12 19:39:58.435144 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:39:58.435144 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 19:39:58.443334 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:39:58.479100 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:39:58.480941 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:39:58.480941 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:39:58.532431 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:39:58.918725 ignition[863]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 12 19:39:58.921609 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:39:58.921609 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:39:58.921609 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:39:58.954191 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:39:59.754662 ignition[863]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 12 19:39:59.757554 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:39:59.757554 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:39:59.757554 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 12 19:39:59.779980 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:40:00.166518 ignition[863]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:40:00.169942 ignition[863]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:40:00.169942 ignition[863]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:40:00.169942 ignition[863]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:40:00.169942 ignition[863]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:40:00.169942 ignition[863]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(17): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(19): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:40:00.197217 ignition[863]: INFO : files: op(19): op(1a): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:40:00.232281 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:40:00.232303 kernel: audit: type=1130 audit(1707766800.212:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.232315 kernel: audit: type=1130 audit(1707766800.223:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.232324 kernel: audit: type=1131 audit(1707766800.223:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.232334 kernel: audit: type=1130 audit(1707766800.229:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.210061 systemd[1]: Finished ignition-files.service. Feb 12 19:40:00.233525 ignition[863]: INFO : files: op(19): op(1a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:40:00.233525 ignition[863]: INFO : files: op(19): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:40:00.233525 ignition[863]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:40:00.233525 ignition[863]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:40:00.233525 ignition[863]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:40:00.233525 ignition[863]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:40:00.233525 ignition[863]: INFO : files: files passed Feb 12 19:40:00.233525 ignition[863]: INFO : Ignition finished successfully Feb 12 19:40:00.213638 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:40:00.216845 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:40:00.247433 initrd-setup-root-after-ignition[887]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:40:00.252960 kernel: audit: type=1130 audit(1707766800.247:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.252981 kernel: audit: type=1131 audit(1707766800.247:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.217622 systemd[1]: Starting ignition-quench.service... Feb 12 19:40:00.254258 initrd-setup-root-after-ignition[890]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:40:00.221383 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:40:00.221467 systemd[1]: Finished ignition-quench.service. Feb 12 19:40:00.224250 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:40:00.229237 systemd[1]: Reached target ignition-complete.target. Feb 12 19:40:00.233568 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:40:00.246110 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:40:00.246205 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:40:00.248297 systemd[1]: Reached target initrd-fs.target. Feb 12 19:40:00.253602 systemd[1]: Reached target initrd.target. Feb 12 19:40:00.254973 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:40:00.255694 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:40:00.265969 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:40:00.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.267963 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:40:00.270954 kernel: audit: type=1130 audit(1707766800.267:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.276136 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:40:00.277107 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:40:00.278555 systemd[1]: Stopped target timers.target. Feb 12 19:40:00.279901 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:40:00.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.280018 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:40:00.285076 kernel: audit: type=1131 audit(1707766800.281:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.281346 systemd[1]: Stopped target initrd.target. Feb 12 19:40:00.284522 systemd[1]: Stopped target basic.target. Feb 12 19:40:00.285785 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:40:00.287165 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:40:00.288504 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:40:00.290067 systemd[1]: Stopped target remote-fs.target. Feb 12 19:40:00.291498 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:40:00.292990 systemd[1]: Stopped target sysinit.target. Feb 12 19:40:00.294355 systemd[1]: Stopped target local-fs.target. Feb 12 19:40:00.295671 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:40:00.297016 systemd[1]: Stopped target swap.target. Feb 12 19:40:00.301897 kernel: audit: type=1131 audit(1707766800.299:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.298266 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:40:00.298383 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:40:00.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.299666 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:40:00.308015 kernel: audit: type=1131 audit(1707766800.304:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.302743 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:40:00.302859 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:40:00.304371 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:40:00.304469 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:40:00.307576 systemd[1]: Stopped target paths.target. Feb 12 19:40:00.308683 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:40:00.311901 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:40:00.312893 systemd[1]: Stopped target slices.target. Feb 12 19:40:00.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.314100 systemd[1]: Stopped target sockets.target. Feb 12 19:40:00.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.315625 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:40:00.315752 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:40:00.322474 iscsid[750]: iscsid shutting down. Feb 12 19:40:00.317237 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:40:00.317328 systemd[1]: Stopped ignition-files.service. Feb 12 19:40:00.319372 systemd[1]: Stopping ignition-mount.service... Feb 12 19:40:00.320893 systemd[1]: Stopping iscsid.service... Feb 12 19:40:00.326354 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:40:00.328048 ignition[903]: INFO : Ignition 2.14.0 Feb 12 19:40:00.328048 ignition[903]: INFO : Stage: umount Feb 12 19:40:00.328048 ignition[903]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:40:00.328048 ignition[903]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:40:00.328048 ignition[903]: INFO : umount: umount passed Feb 12 19:40:00.328048 ignition[903]: INFO : Ignition finished successfully Feb 12 19:40:00.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.327434 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:40:00.327563 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:40:00.328813 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:40:00.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.328931 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:40:00.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.331430 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:40:00.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.331522 systemd[1]: Stopped iscsid.service. Feb 12 19:40:00.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.333914 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:40:00.333985 systemd[1]: Closed iscsid.socket. Feb 12 19:40:00.334695 systemd[1]: Stopping iscsiuio.service... Feb 12 19:40:00.337474 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:40:00.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.338051 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:40:00.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.338156 systemd[1]: Stopped iscsiuio.service. Feb 12 19:40:00.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.339446 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:40:00.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.339531 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:40:00.340941 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:40:00.341024 systemd[1]: Stopped ignition-mount.service. Feb 12 19:40:00.342229 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:40:00.342311 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:40:00.344070 systemd[1]: Stopped target network.target. Feb 12 19:40:00.345228 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:40:00.345258 systemd[1]: Closed iscsiuio.socket. Feb 12 19:40:00.346171 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:40:00.346206 systemd[1]: Stopped ignition-disks.service. Feb 12 19:40:00.347383 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:40:00.347419 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:40:00.348635 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:40:00.348665 systemd[1]: Stopped ignition-setup.service. Feb 12 19:40:00.349841 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:40:00.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.349886 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:40:00.351044 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:40:00.352392 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:40:00.361909 systemd-networkd[744]: eth0: DHCPv6 lease lost Feb 12 19:40:00.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.363689 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:40:00.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.363784 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:40:00.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.365092 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:40:00.373000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:40:00.365144 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:40:00.366870 systemd[1]: Stopping network-cleanup.service... Feb 12 19:40:00.367611 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:40:00.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.367683 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:40:00.368760 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:40:00.368794 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:40:00.370405 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:40:00.370443 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:40:00.371559 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:40:00.376388 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:40:00.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.376899 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:40:00.376992 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:40:00.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.387000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:40:00.381000 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:40:00.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.381102 systemd[1]: Stopped network-cleanup.service. Feb 12 19:40:00.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.382971 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:40:00.383097 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:40:00.384211 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:40:00.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.384246 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:40:00.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.385117 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:40:00.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.385148 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:40:00.386584 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:40:00.386624 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:40:00.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.387821 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:40:00.387868 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:40:00.389017 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:40:00.389057 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:40:00.390946 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:40:00.392180 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:40:00.392240 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:40:00.394159 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:40:00.394200 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:40:00.395043 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:40:00.395081 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:40:00.397033 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:40:00.397422 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:40:00.397508 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:40:00.398989 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:40:00.400791 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:40:00.407641 systemd[1]: Switching root. Feb 12 19:40:00.427128 systemd-journald[289]: Journal stopped Feb 12 19:40:02.482166 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Feb 12 19:40:02.482225 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:40:02.482238 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:40:02.482251 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:40:02.482261 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:40:02.482271 kernel: SELinux: policy capability open_perms=1 Feb 12 19:40:02.482285 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:40:02.482298 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:40:02.482307 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:40:02.482323 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:40:02.482333 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:40:02.482342 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:40:02.482352 systemd[1]: Successfully loaded SELinux policy in 33.037ms. Feb 12 19:40:02.482368 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.729ms. Feb 12 19:40:02.482380 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:40:02.482392 systemd[1]: Detected virtualization kvm. Feb 12 19:40:02.482402 systemd[1]: Detected architecture arm64. Feb 12 19:40:02.482412 systemd[1]: Detected first boot. Feb 12 19:40:02.482423 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:40:02.482433 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:40:02.482443 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:40:02.482454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:02.482466 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:02.482479 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:02.482491 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:40:02.482503 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:40:02.482514 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:40:02.482524 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:40:02.482534 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:40:02.482544 systemd[1]: Created slice system-getty.slice. Feb 12 19:40:02.482556 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:40:02.482567 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:40:02.482577 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:40:02.482588 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:40:02.482598 systemd[1]: Created slice user.slice. Feb 12 19:40:02.482612 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:40:02.482622 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:40:02.482632 systemd[1]: Set up automount boot.automount. Feb 12 19:40:02.482643 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:40:02.482653 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:40:02.482665 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:40:02.482676 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:40:02.482686 systemd[1]: Reached target integritysetup.target. Feb 12 19:40:02.482697 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:40:02.482707 systemd[1]: Reached target remote-fs.target. Feb 12 19:40:02.482718 systemd[1]: Reached target slices.target. Feb 12 19:40:02.482729 systemd[1]: Reached target swap.target. Feb 12 19:40:02.482739 systemd[1]: Reached target torcx.target. Feb 12 19:40:02.482751 systemd[1]: Reached target veritysetup.target. Feb 12 19:40:02.482762 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:40:02.482771 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:40:02.482781 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:40:02.482792 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:40:02.482802 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:40:02.482813 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:40:02.482829 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:40:02.482841 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:40:02.482853 systemd[1]: Mounting media.mount... Feb 12 19:40:02.482863 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:40:02.482902 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:40:02.482919 systemd[1]: Mounting tmp.mount... Feb 12 19:40:02.482930 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:40:02.482941 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:40:02.482951 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:40:02.482962 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:40:02.482972 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:40:02.482984 systemd[1]: Starting modprobe@drm.service... Feb 12 19:40:02.482995 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:40:02.483005 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:40:02.483016 systemd[1]: Starting modprobe@loop.service... Feb 12 19:40:02.483026 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:40:02.483036 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:40:02.483047 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:40:02.483057 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:40:02.483069 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:40:02.483080 systemd[1]: Stopped systemd-journald.service. Feb 12 19:40:02.483090 systemd[1]: Starting systemd-journald.service... Feb 12 19:40:02.483100 kernel: loop: module loaded Feb 12 19:40:02.483110 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:40:02.483121 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:40:02.483131 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:40:02.483141 kernel: fuse: init (API version 7.34) Feb 12 19:40:02.483152 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:40:02.483164 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:40:02.483175 systemd[1]: Stopped verity-setup.service. Feb 12 19:40:02.483185 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:40:02.483196 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:40:02.483207 systemd[1]: Mounted media.mount. Feb 12 19:40:02.483220 systemd-journald[1003]: Journal started Feb 12 19:40:02.483265 systemd-journald[1003]: Runtime Journal (/run/log/journal/c5bc6057651e4bbe92b3d03ace7dfa50) is 6.0M, max 48.7M, 42.6M free. Feb 12 19:40:00.494000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:40:00.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:40:00.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:40:00.657000 audit: BPF prog-id=10 op=LOAD Feb 12 19:40:00.657000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:40:00.658000 audit: BPF prog-id=11 op=LOAD Feb 12 19:40:00.658000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:40:00.696000 audit[937]: AVC avc: denied { associate } for pid=937 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:40:00.696000 audit[937]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58ac a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=920 pid=937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:00.696000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:40:00.697000 audit[937]: AVC avc: denied { associate } for pid=937 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:40:00.697000 audit[937]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5985 a2=1ed a3=0 items=2 ppid=920 pid=937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:00.697000 audit: CWD cwd="/" Feb 12 19:40:00.697000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:00.697000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:00.697000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:40:02.363000 audit: BPF prog-id=12 op=LOAD Feb 12 19:40:02.363000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:40:02.364000 audit: BPF prog-id=13 op=LOAD Feb 12 19:40:02.364000 audit: BPF prog-id=14 op=LOAD Feb 12 19:40:02.364000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:40:02.364000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:40:02.364000 audit: BPF prog-id=15 op=LOAD Feb 12 19:40:02.365000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:40:02.365000 audit: BPF prog-id=16 op=LOAD Feb 12 19:40:02.365000 audit: BPF prog-id=17 op=LOAD Feb 12 19:40:02.365000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:40:02.365000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:40:02.365000 audit: BPF prog-id=18 op=LOAD Feb 12 19:40:02.365000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:40:02.365000 audit: BPF prog-id=19 op=LOAD Feb 12 19:40:02.365000 audit: BPF prog-id=20 op=LOAD Feb 12 19:40:02.365000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:40:02.365000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:40:02.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.378000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:40:02.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.458000 audit: BPF prog-id=21 op=LOAD Feb 12 19:40:02.458000 audit: BPF prog-id=22 op=LOAD Feb 12 19:40:02.458000 audit: BPF prog-id=23 op=LOAD Feb 12 19:40:02.458000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:40:02.458000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:40:02.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.480000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:40:02.480000 audit[1003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffedb3c4f0 a2=4000 a3=1 items=0 ppid=1 pid=1003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:02.480000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:40:02.363427 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:40:00.695812 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:02.363439 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:40:00.696100 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:40:02.366830 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:40:00.696119 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:40:00.696149 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:40:00.696159 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:40:00.696185 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:40:00.696197 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:40:00.696419 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:40:00.696454 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:40:00.696467 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:40:00.697191 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:40:02.485376 systemd[1]: Started systemd-journald.service. Feb 12 19:40:00.697229 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:40:00.697249 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:40:02.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:00.697263 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:40:00.697280 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:40:00.697294 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:40:02.122210 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:40:02.122464 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:40:02.122551 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:40:02.485949 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:40:02.122701 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:40:02.122752 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:40:02.122807 /usr/lib/systemd/system-generators/torcx-generator[937]: time="2024-02-12T19:40:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:40:02.486804 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:40:02.487692 systemd[1]: Mounted tmp.mount. Feb 12 19:40:02.488595 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:40:02.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.489635 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:40:02.489794 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:40:02.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.490841 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:40:02.491025 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:40:02.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.492150 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:40:02.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.492916 systemd[1]: Finished modprobe@drm.service. Feb 12 19:40:02.493923 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:40:02.494082 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:40:02.495104 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:40:02.495591 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:40:02.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.496671 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:40:02.496844 systemd[1]: Finished modprobe@loop.service. Feb 12 19:40:02.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.497969 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:40:02.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.499048 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:40:02.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.500209 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:40:02.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.501328 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:40:02.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.502658 systemd[1]: Reached target network-pre.target. Feb 12 19:40:02.504619 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:40:02.506400 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:40:02.507144 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:40:02.509464 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:40:02.511327 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:40:02.511998 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:40:02.513047 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:40:02.513722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:40:02.514924 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:40:02.517338 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:40:02.522390 systemd-journald[1003]: Time spent on flushing to /var/log/journal/c5bc6057651e4bbe92b3d03ace7dfa50 is 14.999ms for 1033 entries. Feb 12 19:40:02.522390 systemd-journald[1003]: System Journal (/var/log/journal/c5bc6057651e4bbe92b3d03ace7dfa50) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:40:02.545811 systemd-journald[1003]: Received client request to flush runtime journal. Feb 12 19:40:02.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.522748 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:40:02.546843 udevadm[1037]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:40:02.524497 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:40:02.525583 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:40:02.526799 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:40:02.528026 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:40:02.530095 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:40:02.536370 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:40:02.543908 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:40:02.545775 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:40:02.548473 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:40:02.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.560237 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:40:02.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.880170 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:40:02.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.880000 audit: BPF prog-id=24 op=LOAD Feb 12 19:40:02.880000 audit: BPF prog-id=25 op=LOAD Feb 12 19:40:02.880000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:40:02.880000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:40:02.882317 systemd[1]: Starting systemd-udevd.service... Feb 12 19:40:02.901137 systemd-udevd[1042]: Using default interface naming scheme 'v252'. Feb 12 19:40:02.912167 systemd[1]: Started systemd-udevd.service. Feb 12 19:40:02.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:02.913000 audit: BPF prog-id=26 op=LOAD Feb 12 19:40:02.915256 systemd[1]: Starting systemd-networkd.service... Feb 12 19:40:02.931510 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:40:02.946000 audit: BPF prog-id=27 op=LOAD Feb 12 19:40:02.946000 audit: BPF prog-id=28 op=LOAD Feb 12 19:40:02.946000 audit: BPF prog-id=29 op=LOAD Feb 12 19:40:02.948462 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:40:02.973079 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:40:02.991070 systemd[1]: Started systemd-userdbd.service. Feb 12 19:40:02.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.009307 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:40:03.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.011215 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:40:03.031297 lvm[1074]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:40:03.041066 systemd-networkd[1051]: lo: Link UP Feb 12 19:40:03.041077 systemd-networkd[1051]: lo: Gained carrier Feb 12 19:40:03.043231 systemd-networkd[1051]: Enumeration completed Feb 12 19:40:03.043343 systemd-networkd[1051]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:40:03.043350 systemd[1]: Started systemd-networkd.service. Feb 12 19:40:03.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.044825 systemd-networkd[1051]: eth0: Link UP Feb 12 19:40:03.044836 systemd-networkd[1051]: eth0: Gained carrier Feb 12 19:40:03.070693 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:40:03.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.071505 systemd[1]: Reached target cryptsetup.target. Feb 12 19:40:03.072994 systemd-networkd[1051]: eth0: DHCPv4 address 10.0.0.3/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:40:03.073210 systemd[1]: Starting lvm2-activation.service... Feb 12 19:40:03.076869 lvm[1076]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:40:03.103784 systemd[1]: Finished lvm2-activation.service. Feb 12 19:40:03.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.104569 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:40:03.105208 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:40:03.105237 systemd[1]: Reached target local-fs.target. Feb 12 19:40:03.105766 systemd[1]: Reached target machines.target. Feb 12 19:40:03.107452 systemd[1]: Starting ldconfig.service... Feb 12 19:40:03.108305 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:40:03.108358 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:40:03.109534 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:40:03.111518 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:40:03.113781 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:40:03.115267 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:40:03.115315 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:40:03.116443 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:40:03.119633 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1078 (bootctl) Feb 12 19:40:03.120573 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:40:03.126681 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:40:03.128076 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:40:03.128124 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:40:03.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.130731 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:40:03.211534 systemd-fsck[1087]: fsck.fat 4.2 (2021-01-31) Feb 12 19:40:03.211534 systemd-fsck[1087]: /dev/vda1: 236 files, 113719/258078 clusters Feb 12 19:40:03.213942 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:40:03.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.216510 systemd[1]: Mounting boot.mount... Feb 12 19:40:03.225369 systemd[1]: Mounted boot.mount. Feb 12 19:40:03.254499 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:40:03.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.256246 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:40:03.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.322294 ldconfig[1077]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:40:03.327343 systemd[1]: Finished ldconfig.service. Feb 12 19:40:03.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.342717 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:40:03.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.344779 systemd[1]: Starting audit-rules.service... Feb 12 19:40:03.346418 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:40:03.348543 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:40:03.349000 audit: BPF prog-id=30 op=LOAD Feb 12 19:40:03.351095 systemd[1]: Starting systemd-resolved.service... Feb 12 19:40:03.351000 audit: BPF prog-id=31 op=LOAD Feb 12 19:40:03.353294 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:40:03.356044 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:40:03.357298 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:40:03.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.358552 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:40:03.365000 audit[1100]: SYSTEM_BOOT pid=1100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.367738 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:40:03.373525 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:40:03.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.375532 systemd[1]: Starting systemd-update-done.service... Feb 12 19:40:03.381554 systemd[1]: Finished systemd-update-done.service. Feb 12 19:40:03.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:03.384000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:40:03.384000 audit[1111]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcf523680 a2=420 a3=0 items=0 ppid=1090 pid=1111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:03.384000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:40:03.385658 augenrules[1111]: No rules Feb 12 19:40:03.386504 systemd[1]: Finished audit-rules.service. Feb 12 19:40:03.402528 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:40:03.893243 systemd-timesyncd[1095]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:40:03.893290 systemd-timesyncd[1095]: Initial clock synchronization to Mon 2024-02-12 19:40:03.893167 UTC. Feb 12 19:40:03.893375 systemd[1]: Reached target time-set.target. Feb 12 19:40:03.894757 systemd-resolved[1094]: Positive Trust Anchors: Feb 12 19:40:03.894768 systemd-resolved[1094]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:40:03.894795 systemd-resolved[1094]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:40:03.903856 systemd-resolved[1094]: Defaulting to hostname 'linux'. Feb 12 19:40:03.905169 systemd[1]: Started systemd-resolved.service. Feb 12 19:40:03.906008 systemd[1]: Reached target network.target. Feb 12 19:40:03.906749 systemd[1]: Reached target nss-lookup.target. Feb 12 19:40:03.907478 systemd[1]: Reached target sysinit.target. Feb 12 19:40:03.908256 systemd[1]: Started motdgen.path. Feb 12 19:40:03.908955 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:40:03.910098 systemd[1]: Started logrotate.timer. Feb 12 19:40:03.910896 systemd[1]: Started mdadm.timer. Feb 12 19:40:03.911582 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:40:03.912357 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:40:03.912390 systemd[1]: Reached target paths.target. Feb 12 19:40:03.913114 systemd[1]: Reached target timers.target. Feb 12 19:40:03.914090 systemd[1]: Listening on dbus.socket. Feb 12 19:40:03.915671 systemd[1]: Starting docker.socket... Feb 12 19:40:03.918567 systemd[1]: Listening on sshd.socket. Feb 12 19:40:03.919342 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:40:03.919747 systemd[1]: Listening on docker.socket. Feb 12 19:40:03.920539 systemd[1]: Reached target sockets.target. Feb 12 19:40:03.921244 systemd[1]: Reached target basic.target. Feb 12 19:40:03.921996 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:40:03.922029 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:40:03.922944 systemd[1]: Starting containerd.service... Feb 12 19:40:03.924535 systemd[1]: Starting dbus.service... Feb 12 19:40:03.926195 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:40:03.928089 systemd[1]: Starting extend-filesystems.service... Feb 12 19:40:03.928999 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:40:03.930159 systemd[1]: Starting motdgen.service... Feb 12 19:40:03.932524 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:40:03.935628 systemd[1]: Starting prepare-critools.service... Feb 12 19:40:03.935998 jq[1121]: false Feb 12 19:40:03.937597 systemd[1]: Starting prepare-helm.service... Feb 12 19:40:03.940046 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:40:03.943646 systemd[1]: Starting sshd-keygen.service... Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda1 Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda2 Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda3 Feb 12 19:40:03.945923 extend-filesystems[1122]: Found usr Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda4 Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda6 Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda7 Feb 12 19:40:03.945923 extend-filesystems[1122]: Found vda9 Feb 12 19:40:03.945923 extend-filesystems[1122]: Checking size of /dev/vda9 Feb 12 19:40:03.970043 extend-filesystems[1122]: Resized partition /dev/vda9 Feb 12 19:40:03.961055 dbus-daemon[1120]: [system] SELinux support is enabled Feb 12 19:40:03.948758 systemd[1]: Starting systemd-logind.service... Feb 12 19:40:03.949906 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:40:03.949961 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:40:03.996192 jq[1142]: true Feb 12 19:40:03.950342 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:40:03.951074 systemd[1]: Starting update-engine.service... Feb 12 19:40:03.996490 tar[1149]: ./ Feb 12 19:40:03.996490 tar[1149]: ./macvlan Feb 12 19:40:03.953606 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:40:03.996799 tar[1150]: crictl Feb 12 19:40:03.960571 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:40:03.997039 tar[1151]: linux-arm64/helm Feb 12 19:40:03.960765 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:40:03.997248 jq[1152]: true Feb 12 19:40:03.961056 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:40:03.961234 systemd[1]: Finished motdgen.service. Feb 12 19:40:03.962172 systemd[1]: Started dbus.service. Feb 12 19:40:03.967009 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:40:03.971211 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:40:03.971393 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:40:03.980090 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:40:03.980112 systemd[1]: Reached target system-config.target. Feb 12 19:40:03.981229 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:40:03.981245 systemd[1]: Reached target user-config.target. Feb 12 19:40:04.006732 extend-filesystems[1148]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:40:04.023843 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:40:04.019611 systemd-logind[1139]: Watching system buttons on /dev/input/event0 (Power Button) Feb 12 19:40:04.019888 systemd-logind[1139]: New seat seat0. Feb 12 19:40:04.025526 systemd[1]: Started systemd-logind.service. Feb 12 19:40:04.052533 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:40:04.069686 bash[1173]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:40:04.070621 extend-filesystems[1148]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:40:04.070621 extend-filesystems[1148]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:40:04.070621 extend-filesystems[1148]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:40:04.074737 extend-filesystems[1122]: Resized filesystem in /dev/vda9 Feb 12 19:40:04.070700 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:40:04.072867 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:40:04.073010 systemd[1]: Finished extend-filesystems.service. Feb 12 19:40:04.080463 update_engine[1141]: I0212 19:40:04.080238 1141 main.cc:92] Flatcar Update Engine starting Feb 12 19:40:04.082319 systemd[1]: Started update-engine.service. Feb 12 19:40:04.084829 systemd[1]: Started locksmithd.service. Feb 12 19:40:04.085799 update_engine[1141]: I0212 19:40:04.085774 1141 update_check_scheduler.cc:74] Next update check in 4m18s Feb 12 19:40:04.087464 tar[1149]: ./static Feb 12 19:40:04.104778 env[1153]: time="2024-02-12T19:40:04.104729705Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:40:04.136206 env[1153]: time="2024-02-12T19:40:04.136108905Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:40:04.136305 env[1153]: time="2024-02-12T19:40:04.136255025Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:40:04.146961 env[1153]: time="2024-02-12T19:40:04.146918625Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:40:04.146961 env[1153]: time="2024-02-12T19:40:04.146954225Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147060 tar[1149]: ./vlan Feb 12 19:40:04.147257 env[1153]: time="2024-02-12T19:40:04.147186825Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147257 env[1153]: time="2024-02-12T19:40:04.147218585Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147257 env[1153]: time="2024-02-12T19:40:04.147231305Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:40:04.147257 env[1153]: time="2024-02-12T19:40:04.147240345Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147355 env[1153]: time="2024-02-12T19:40:04.147325345Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147673 env[1153]: time="2024-02-12T19:40:04.147647425Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147804 env[1153]: time="2024-02-12T19:40:04.147782505Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:40:04.147804 env[1153]: time="2024-02-12T19:40:04.147801385Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:40:04.147886 env[1153]: time="2024-02-12T19:40:04.147866145Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:40:04.147886 env[1153]: time="2024-02-12T19:40:04.147883665Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:40:04.151724 env[1153]: time="2024-02-12T19:40:04.151684185Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:40:04.151724 env[1153]: time="2024-02-12T19:40:04.151716185Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:40:04.151809 env[1153]: time="2024-02-12T19:40:04.151730625Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:40:04.151809 env[1153]: time="2024-02-12T19:40:04.151767745Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.151809 env[1153]: time="2024-02-12T19:40:04.151781385Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.151863 env[1153]: time="2024-02-12T19:40:04.151842905Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.151863 env[1153]: time="2024-02-12T19:40:04.151857465Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.152204 env[1153]: time="2024-02-12T19:40:04.152181225Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.152248 env[1153]: time="2024-02-12T19:40:04.152204425Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.152248 env[1153]: time="2024-02-12T19:40:04.152217785Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.152248 env[1153]: time="2024-02-12T19:40:04.152229625Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.152248 env[1153]: time="2024-02-12T19:40:04.152242705Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:40:04.152400 env[1153]: time="2024-02-12T19:40:04.152351945Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:40:04.152526 env[1153]: time="2024-02-12T19:40:04.152451505Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:40:04.152739 env[1153]: time="2024-02-12T19:40:04.152717425Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:40:04.152783 env[1153]: time="2024-02-12T19:40:04.152747545Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.152783 env[1153]: time="2024-02-12T19:40:04.152762865Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:40:04.152886 env[1153]: time="2024-02-12T19:40:04.152867705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.152886 env[1153]: time="2024-02-12T19:40:04.152883985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.152943 env[1153]: time="2024-02-12T19:40:04.152896505Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.152943 env[1153]: time="2024-02-12T19:40:04.152908665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.152980 env[1153]: time="2024-02-12T19:40:04.152962785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.152980 env[1153]: time="2024-02-12T19:40:04.152977185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153022 env[1153]: time="2024-02-12T19:40:04.152989185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153022 env[1153]: time="2024-02-12T19:40:04.153001025Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153022 env[1153]: time="2024-02-12T19:40:04.153013785Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:40:04.153166 env[1153]: time="2024-02-12T19:40:04.153144625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153205 env[1153]: time="2024-02-12T19:40:04.153165705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153205 env[1153]: time="2024-02-12T19:40:04.153183625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153205 env[1153]: time="2024-02-12T19:40:04.153196025Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:40:04.153267 env[1153]: time="2024-02-12T19:40:04.153208945Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:40:04.153267 env[1153]: time="2024-02-12T19:40:04.153219785Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:40:04.153267 env[1153]: time="2024-02-12T19:40:04.153235545Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:40:04.153323 env[1153]: time="2024-02-12T19:40:04.153266185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:40:04.153515 env[1153]: time="2024-02-12T19:40:04.153451385Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.153524985Z" level=info msg="Connect containerd service" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.153554625Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154224665Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154465385Z" level=info msg="Start subscribing containerd event" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154509745Z" level=info msg="Start recovering state" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154564505Z" level=info msg="Start event monitor" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154580305Z" level=info msg="Start snapshots syncer" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154588945Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154597025Z" level=info msg="Start streaming server" Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.154985185Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:40:04.156099 env[1153]: time="2024-02-12T19:40:04.155036785Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:40:04.155196 systemd[1]: Started containerd.service. Feb 12 19:40:04.163604 env[1153]: time="2024-02-12T19:40:04.163572105Z" level=info msg="containerd successfully booted in 0.059588s" Feb 12 19:40:04.232418 tar[1149]: ./portmap Feb 12 19:40:04.268042 tar[1149]: ./host-local Feb 12 19:40:04.296680 tar[1149]: ./vrf Feb 12 19:40:04.329271 tar[1149]: ./bridge Feb 12 19:40:04.367742 tar[1149]: ./tuning Feb 12 19:40:04.395864 tar[1149]: ./firewall Feb 12 19:40:04.434511 tar[1149]: ./host-device Feb 12 19:40:04.436512 systemd[1]: Finished prepare-critools.service. Feb 12 19:40:04.446838 tar[1151]: linux-arm64/LICENSE Feb 12 19:40:04.446838 tar[1151]: linux-arm64/README.md Feb 12 19:40:04.450570 systemd[1]: Finished prepare-helm.service. Feb 12 19:40:04.454998 locksmithd[1180]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:40:04.466812 tar[1149]: ./sbr Feb 12 19:40:04.490407 tar[1149]: ./loopback Feb 12 19:40:04.513345 tar[1149]: ./dhcp Feb 12 19:40:04.577460 tar[1149]: ./ptp Feb 12 19:40:04.605314 tar[1149]: ./ipvlan Feb 12 19:40:04.632405 tar[1149]: ./bandwidth Feb 12 19:40:04.667060 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:40:05.026824 sshd_keygen[1144]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:40:05.043774 systemd[1]: Finished sshd-keygen.service. Feb 12 19:40:05.045901 systemd[1]: Starting issuegen.service... Feb 12 19:40:05.050403 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:40:05.050563 systemd[1]: Finished issuegen.service. Feb 12 19:40:05.052598 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:40:05.058621 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:40:05.060600 systemd[1]: Started getty@tty1.service. Feb 12 19:40:05.062467 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:40:05.063472 systemd[1]: Reached target getty.target. Feb 12 19:40:05.064275 systemd[1]: Reached target multi-user.target. Feb 12 19:40:05.066129 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:40:05.072060 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:40:05.072194 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:40:05.073186 systemd[1]: Startup finished in 558ms (kernel) + 5.883s (initrd) + 4.124s (userspace) = 10.566s. Feb 12 19:40:05.481725 systemd-networkd[1051]: eth0: Gained IPv6LL Feb 12 19:40:08.205131 systemd[1]: Created slice system-sshd.slice. Feb 12 19:40:08.206352 systemd[1]: Started sshd@0-10.0.0.3:22-10.0.0.1:60452.service. Feb 12 19:40:08.276090 sshd[1209]: Accepted publickey for core from 10.0.0.1 port 60452 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:08.279396 sshd[1209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.293009 systemd[1]: Created slice user-500.slice. Feb 12 19:40:08.294239 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:40:08.297115 systemd-logind[1139]: New session 1 of user core. Feb 12 19:40:08.303093 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:40:08.304744 systemd[1]: Starting user@500.service... Feb 12 19:40:08.307922 (systemd)[1212]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.368257 systemd[1212]: Queued start job for default target default.target. Feb 12 19:40:08.368790 systemd[1212]: Reached target paths.target. Feb 12 19:40:08.368811 systemd[1212]: Reached target sockets.target. Feb 12 19:40:08.368823 systemd[1212]: Reached target timers.target. Feb 12 19:40:08.368833 systemd[1212]: Reached target basic.target. Feb 12 19:40:08.368886 systemd[1212]: Reached target default.target. Feb 12 19:40:08.368913 systemd[1212]: Startup finished in 55ms. Feb 12 19:40:08.369264 systemd[1]: Started user@500.service. Feb 12 19:40:08.370473 systemd[1]: Started session-1.scope. Feb 12 19:40:08.424449 systemd[1]: Started sshd@1-10.0.0.3:22-10.0.0.1:60460.service. Feb 12 19:40:08.467569 sshd[1221]: Accepted publickey for core from 10.0.0.1 port 60460 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:08.468829 sshd[1221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.473319 systemd-logind[1139]: New session 2 of user core. Feb 12 19:40:08.474195 systemd[1]: Started session-2.scope. Feb 12 19:40:08.533776 sshd[1221]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:08.537385 systemd[1]: Started sshd@2-10.0.0.3:22-10.0.0.1:60464.service. Feb 12 19:40:08.538195 systemd[1]: sshd@1-10.0.0.3:22-10.0.0.1:60460.service: Deactivated successfully. Feb 12 19:40:08.538984 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:40:08.539558 systemd-logind[1139]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:40:08.540457 systemd-logind[1139]: Removed session 2. Feb 12 19:40:08.580271 sshd[1226]: Accepted publickey for core from 10.0.0.1 port 60464 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:08.581999 sshd[1226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.585858 systemd-logind[1139]: New session 3 of user core. Feb 12 19:40:08.586304 systemd[1]: Started session-3.scope. Feb 12 19:40:08.636108 sshd[1226]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:08.639750 systemd[1]: sshd@2-10.0.0.3:22-10.0.0.1:60464.service: Deactivated successfully. Feb 12 19:40:08.640284 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:40:08.640872 systemd-logind[1139]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:40:08.641954 systemd[1]: Started sshd@3-10.0.0.3:22-10.0.0.1:60478.service. Feb 12 19:40:08.643537 systemd-logind[1139]: Removed session 3. Feb 12 19:40:08.684456 sshd[1233]: Accepted publickey for core from 10.0.0.1 port 60478 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:08.685998 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.690389 systemd-logind[1139]: New session 4 of user core. Feb 12 19:40:08.691180 systemd[1]: Started session-4.scope. Feb 12 19:40:08.750196 sshd[1233]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:08.754073 systemd[1]: Started sshd@4-10.0.0.3:22-10.0.0.1:60482.service. Feb 12 19:40:08.756213 systemd[1]: sshd@3-10.0.0.3:22-10.0.0.1:60478.service: Deactivated successfully. Feb 12 19:40:08.757013 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:40:08.757886 systemd-logind[1139]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:40:08.758731 systemd-logind[1139]: Removed session 4. Feb 12 19:40:08.798893 sshd[1238]: Accepted publickey for core from 10.0.0.1 port 60482 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:08.800077 sshd[1238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.803177 systemd-logind[1139]: New session 5 of user core. Feb 12 19:40:08.804133 systemd[1]: Started session-5.scope. Feb 12 19:40:08.865271 sudo[1242]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:40:08.865482 sudo[1242]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:08.882705 dbus-daemon[1120]: avc: received setenforce notice (enforcing=1) Feb 12 19:40:08.884464 sudo[1242]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:08.888062 sshd[1238]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:08.891112 systemd[1]: sshd@4-10.0.0.3:22-10.0.0.1:60482.service: Deactivated successfully. Feb 12 19:40:08.891830 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:40:08.892411 systemd-logind[1139]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:40:08.893430 systemd[1]: Started sshd@5-10.0.0.3:22-10.0.0.1:60488.service. Feb 12 19:40:08.894154 systemd-logind[1139]: Removed session 5. Feb 12 19:40:08.937648 sshd[1246]: Accepted publickey for core from 10.0.0.1 port 60488 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:08.939223 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.942976 systemd-logind[1139]: New session 6 of user core. Feb 12 19:40:08.943397 systemd[1]: Started session-6.scope. Feb 12 19:40:08.996237 sudo[1250]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:40:08.996458 sudo[1250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:08.999179 sudo[1250]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:09.003445 sudo[1249]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:40:09.003653 sudo[1249]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:09.011661 systemd[1]: Stopping audit-rules.service... Feb 12 19:40:09.012000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:40:09.012985 auditctl[1253]: No rules Feb 12 19:40:09.014561 kernel: kauditd_printk_skb: 138 callbacks suppressed Feb 12 19:40:09.014617 kernel: audit: type=1305 audit(1707766809.012:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:40:09.014635 kernel: audit: type=1300 audit(1707766809.012:170): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc4962640 a2=420 a3=0 items=0 ppid=1 pid=1253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.012000 audit[1253]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc4962640 a2=420 a3=0 items=0 ppid=1 pid=1253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.014919 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:40:09.015071 systemd[1]: Stopped audit-rules.service. Feb 12 19:40:09.016425 systemd[1]: Starting audit-rules.service... Feb 12 19:40:09.017269 kernel: audit: type=1327 audit(1707766809.012:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:40:09.012000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:40:09.018060 kernel: audit: type=1131 audit(1707766809.014:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.033197 augenrules[1270]: No rules Feb 12 19:40:09.033963 systemd[1]: Finished audit-rules.service. Feb 12 19:40:09.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.036302 sudo[1249]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:09.036526 kernel: audit: type=1130 audit(1707766809.033:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.035000 audit[1249]: USER_END pid=1249 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.040627 sshd[1246]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:09.035000 audit[1249]: CRED_DISP pid=1249 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.042001 systemd[1]: Started sshd@6-10.0.0.3:22-10.0.0.1:60504.service. Feb 12 19:40:09.042840 kernel: audit: type=1106 audit(1707766809.035:173): pid=1249 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.042897 kernel: audit: type=1104 audit(1707766809.035:174): pid=1249 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.042914 kernel: audit: type=1130 audit(1707766809.041:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.044000 audit[1246]: USER_END pid=1246 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.047234 systemd[1]: sshd@5-10.0.0.3:22-10.0.0.1:60488.service: Deactivated successfully. Feb 12 19:40:09.048025 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:40:09.048623 systemd-logind[1139]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:40:09.045000 audit[1246]: CRED_DISP pid=1246 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.049607 systemd-logind[1139]: Removed session 6. Feb 12 19:40:09.051307 kernel: audit: type=1106 audit(1707766809.044:176): pid=1246 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.051367 kernel: audit: type=1104 audit(1707766809.045:177): pid=1246 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:60488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.084000 audit[1275]: USER_ACCT pid=1275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.084918 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 60504 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:40:09.085000 audit[1275]: CRED_ACQ pid=1275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.085000 audit[1275]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebee0450 a2=3 a3=1 items=0 ppid=1 pid=1275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:09.086403 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:09.090044 systemd-logind[1139]: New session 7 of user core. Feb 12 19:40:09.090450 systemd[1]: Started session-7.scope. Feb 12 19:40:09.093000 audit[1275]: USER_START pid=1275 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.094000 audit[1278]: CRED_ACQ pid=1278 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:09.142000 audit[1279]: USER_ACCT pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.143271 sudo[1279]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:40:09.142000 audit[1279]: CRED_REFR pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.143737 sudo[1279]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:09.144000 audit[1279]: USER_START pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.907798 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:40:09.917146 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:40:09.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:09.917478 systemd[1]: Reached target network-online.target. Feb 12 19:40:09.918708 systemd[1]: Starting docker.service... Feb 12 19:40:09.993939 env[1297]: time="2024-02-12T19:40:09.993883305Z" level=info msg="Starting up" Feb 12 19:40:09.995426 env[1297]: time="2024-02-12T19:40:09.995388465Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:40:09.995426 env[1297]: time="2024-02-12T19:40:09.995418505Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:40:09.995525 env[1297]: time="2024-02-12T19:40:09.995439025Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:40:09.995525 env[1297]: time="2024-02-12T19:40:09.995449545Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:40:09.997349 env[1297]: time="2024-02-12T19:40:09.997308265Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:40:09.997349 env[1297]: time="2024-02-12T19:40:09.997331385Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:40:09.997349 env[1297]: time="2024-02-12T19:40:09.997343305Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:40:09.997349 env[1297]: time="2024-02-12T19:40:09.997351225Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:40:10.137885 env[1297]: time="2024-02-12T19:40:10.137845585Z" level=info msg="Loading containers: start." Feb 12 19:40:10.176000 audit[1332]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.176000 audit[1332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe5708740 a2=0 a3=1 items=0 ppid=1297 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:40:10.179000 audit[1334]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.179000 audit[1334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc554dee0 a2=0 a3=1 items=0 ppid=1297 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:40:10.181000 audit[1336]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.181000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff05bafe0 a2=0 a3=1 items=0 ppid=1297 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.181000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:40:10.182000 audit[1338]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.182000 audit[1338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe0b84b50 a2=0 a3=1 items=0 ppid=1297 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:40:10.187000 audit[1340]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.187000 audit[1340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd5397f10 a2=0 a3=1 items=0 ppid=1297 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.187000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:40:10.220000 audit[1345]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.220000 audit[1345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe089ce50 a2=0 a3=1 items=0 ppid=1297 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:40:10.225000 audit[1347]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.225000 audit[1347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffef9d10e0 a2=0 a3=1 items=0 ppid=1297 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:40:10.227000 audit[1349]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.227000 audit[1349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc84a78d0 a2=0 a3=1 items=0 ppid=1297 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:40:10.229000 audit[1351]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.229000 audit[1351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc6063e10 a2=0 a3=1 items=0 ppid=1297 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:40:10.236000 audit[1355]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.236000 audit[1355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcb58fc00 a2=0 a3=1 items=0 ppid=1297 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:40:10.236000 audit[1356]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.236000 audit[1356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffd5e81f0 a2=0 a3=1 items=0 ppid=1297 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:40:10.243528 kernel: Initializing XFRM netlink socket Feb 12 19:40:10.265049 env[1297]: time="2024-02-12T19:40:10.264998785Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:40:10.278000 audit[1364]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.278000 audit[1364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffeeca7140 a2=0 a3=1 items=0 ppid=1297 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.278000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:40:10.289000 audit[1367]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.289000 audit[1367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffdc9fcc90 a2=0 a3=1 items=0 ppid=1297 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:40:10.291000 audit[1370]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.291000 audit[1370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffef392e20 a2=0 a3=1 items=0 ppid=1297 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:40:10.293000 audit[1372]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.293000 audit[1372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff6c8fa50 a2=0 a3=1 items=0 ppid=1297 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:40:10.294000 audit[1374]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.294000 audit[1374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffef748260 a2=0 a3=1 items=0 ppid=1297 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:40:10.296000 audit[1376]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.296000 audit[1376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe75bb440 a2=0 a3=1 items=0 ppid=1297 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:40:10.297000 audit[1378]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.297000 audit[1378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd45bce30 a2=0 a3=1 items=0 ppid=1297 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:40:10.304000 audit[1381]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.304000 audit[1381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdab0e150 a2=0 a3=1 items=0 ppid=1297 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:40:10.305000 audit[1383]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.305000 audit[1383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffde17a4a0 a2=0 a3=1 items=0 ppid=1297 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:40:10.307000 audit[1385]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.307000 audit[1385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffffc297090 a2=0 a3=1 items=0 ppid=1297 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.307000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:40:10.308000 audit[1387]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.308000 audit[1387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd46c2a80 a2=0 a3=1 items=0 ppid=1297 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:40:10.309735 systemd-networkd[1051]: docker0: Link UP Feb 12 19:40:10.316000 audit[1391]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.316000 audit[1391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe821aa0 a2=0 a3=1 items=0 ppid=1297 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:40:10.317000 audit[1392]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:10.317000 audit[1392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffb690ff0 a2=0 a3=1 items=0 ppid=1297 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:10.317000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:40:10.318009 env[1297]: time="2024-02-12T19:40:10.317968825Z" level=info msg="Loading containers: done." Feb 12 19:40:10.336429 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2334074467-merged.mount: Deactivated successfully. Feb 12 19:40:10.342516 env[1297]: time="2024-02-12T19:40:10.342448865Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:40:10.342637 env[1297]: time="2024-02-12T19:40:10.342625985Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:40:10.342749 env[1297]: time="2024-02-12T19:40:10.342714745Z" level=info msg="Daemon has completed initialization" Feb 12 19:40:10.359291 systemd[1]: Started docker.service. Feb 12 19:40:10.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:10.365785 env[1297]: time="2024-02-12T19:40:10.365743345Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:40:10.381961 systemd[1]: Reloading. Feb 12 19:40:10.430228 /usr/lib/systemd/system-generators/torcx-generator[1443]: time="2024-02-12T19:40:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:10.430259 /usr/lib/systemd/system-generators/torcx-generator[1443]: time="2024-02-12T19:40:10Z" level=info msg="torcx already run" Feb 12 19:40:10.482617 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:10.482635 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:10.499430 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit: BPF prog-id=37 op=LOAD Feb 12 19:40:10.543000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit: BPF prog-id=38 op=LOAD Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.543000 audit: BPF prog-id=39 op=LOAD Feb 12 19:40:10.543000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:40:10.543000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit: BPF prog-id=40 op=LOAD Feb 12 19:40:10.544000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit: BPF prog-id=41 op=LOAD Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.544000 audit: BPF prog-id=42 op=LOAD Feb 12 19:40:10.544000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:40:10.544000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.545000 audit: BPF prog-id=43 op=LOAD Feb 12 19:40:10.545000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit: BPF prog-id=44 op=LOAD Feb 12 19:40:10.548000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit: BPF prog-id=45 op=LOAD Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit: BPF prog-id=46 op=LOAD Feb 12 19:40:10.550000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:40:10.550000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit: BPF prog-id=47 op=LOAD Feb 12 19:40:10.551000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit: BPF prog-id=48 op=LOAD Feb 12 19:40:10.551000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit: BPF prog-id=49 op=LOAD Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit: BPF prog-id=50 op=LOAD Feb 12 19:40:10.552000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:40:10.552000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:10.552000 audit: BPF prog-id=51 op=LOAD Feb 12 19:40:10.552000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:40:10.559415 systemd[1]: Started kubelet.service. Feb 12 19:40:10.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:10.722479 kubelet[1477]: E0212 19:40:10.722339 1477 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:40:10.724491 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:40:10.724630 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:40:10.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:40:10.955631 env[1153]: time="2024-02-12T19:40:10.955589425Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 19:40:11.629783 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1896460391.mount: Deactivated successfully. Feb 12 19:40:12.963492 env[1153]: time="2024-02-12T19:40:12.963437945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:12.966661 env[1153]: time="2024-02-12T19:40:12.966621385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:12.968596 env[1153]: time="2024-02-12T19:40:12.968562625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:12.970571 env[1153]: time="2024-02-12T19:40:12.970535785Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:12.971239 env[1153]: time="2024-02-12T19:40:12.971200705Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 12 19:40:12.981081 env[1153]: time="2024-02-12T19:40:12.981023825Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 19:40:14.712299 env[1153]: time="2024-02-12T19:40:14.712184065Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:14.715767 env[1153]: time="2024-02-12T19:40:14.715721425Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:14.718451 env[1153]: time="2024-02-12T19:40:14.718416905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:14.723490 env[1153]: time="2024-02-12T19:40:14.723454305Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:14.724413 env[1153]: time="2024-02-12T19:40:14.724344745Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 12 19:40:14.740801 env[1153]: time="2024-02-12T19:40:14.740757665Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 19:40:15.822191 env[1153]: time="2024-02-12T19:40:15.822142105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:15.823957 env[1153]: time="2024-02-12T19:40:15.823918065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:15.826830 env[1153]: time="2024-02-12T19:40:15.826796505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:15.829213 env[1153]: time="2024-02-12T19:40:15.829174665Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:15.829537 env[1153]: time="2024-02-12T19:40:15.829493945Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 12 19:40:15.843690 env[1153]: time="2024-02-12T19:40:15.843656665Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 19:40:16.761983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1449476072.mount: Deactivated successfully. Feb 12 19:40:17.181253 env[1153]: time="2024-02-12T19:40:17.181204905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.184226 env[1153]: time="2024-02-12T19:40:17.184189505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.185552 env[1153]: time="2024-02-12T19:40:17.185520065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.187188 env[1153]: time="2024-02-12T19:40:17.187153905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.187726 env[1153]: time="2024-02-12T19:40:17.187697705Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 12 19:40:17.198269 env[1153]: time="2024-02-12T19:40:17.198232225Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:40:17.694613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount915825440.mount: Deactivated successfully. Feb 12 19:40:17.698681 env[1153]: time="2024-02-12T19:40:17.698636105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.700015 env[1153]: time="2024-02-12T19:40:17.699976385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.701423 env[1153]: time="2024-02-12T19:40:17.701388425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.703299 env[1153]: time="2024-02-12T19:40:17.703259545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:17.703874 env[1153]: time="2024-02-12T19:40:17.703841785Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 19:40:17.713248 env[1153]: time="2024-02-12T19:40:17.713215505Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 19:40:18.433219 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount720717728.mount: Deactivated successfully. Feb 12 19:40:20.147620 env[1153]: time="2024-02-12T19:40:20.147566625Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:20.151589 env[1153]: time="2024-02-12T19:40:20.151556625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:20.153299 env[1153]: time="2024-02-12T19:40:20.153274345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:20.155208 env[1153]: time="2024-02-12T19:40:20.155175585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:20.155876 env[1153]: time="2024-02-12T19:40:20.155845105Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 12 19:40:20.165580 env[1153]: time="2024-02-12T19:40:20.165545785Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 19:40:20.702685 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3448414670.mount: Deactivated successfully. Feb 12 19:40:20.889797 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:40:20.889974 systemd[1]: Stopped kubelet.service. Feb 12 19:40:20.895706 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 19:40:20.895750 kernel: audit: type=1130 audit(1707766820.889:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.895772 kernel: audit: type=1131 audit(1707766820.889:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.895786 kernel: audit: type=1130 audit(1707766820.891:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.891438 systemd[1]: Started kubelet.service. Feb 12 19:40:20.937747 kubelet[1538]: E0212 19:40:20.937683 1538 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:40:20.940790 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:40:20.940916 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:40:20.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:40:20.943526 kernel: audit: type=1131 audit(1707766820.940:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:40:21.120892 env[1153]: time="2024-02-12T19:40:21.120768265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:21.122949 env[1153]: time="2024-02-12T19:40:21.122597905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:21.124395 env[1153]: time="2024-02-12T19:40:21.124009105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:21.126160 env[1153]: time="2024-02-12T19:40:21.126124225Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:21.126739 env[1153]: time="2024-02-12T19:40:21.126714465Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 12 19:40:26.600839 systemd[1]: Stopped kubelet.service. Feb 12 19:40:26.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.604775 kernel: audit: type=1130 audit(1707766826.600:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.604843 kernel: audit: type=1131 audit(1707766826.600:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.620470 systemd[1]: Reloading. Feb 12 19:40:26.678641 /usr/lib/systemd/system-generators/torcx-generator[1636]: time="2024-02-12T19:40:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:26.678995 /usr/lib/systemd/system-generators/torcx-generator[1636]: time="2024-02-12T19:40:26Z" level=info msg="torcx already run" Feb 12 19:40:26.744809 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:26.744829 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:26.761916 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:26.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810652 kernel: audit: type=1400 audit(1707766826.806:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810720 kernel: audit: type=1400 audit(1707766826.808:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810749 kernel: audit: type=1400 audit(1707766826.808:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812316 kernel: audit: type=1400 audit(1707766826.808:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815700 kernel: audit: type=1400 audit(1707766826.808:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815766 kernel: audit: type=1400 audit(1707766826.808:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817385 kernel: audit: type=1400 audit(1707766826.808:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.819078 kernel: audit: type=1400 audit(1707766826.808:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit: BPF prog-id=52 op=LOAD Feb 12 19:40:26.810000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit: BPF prog-id=53 op=LOAD Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit: BPF prog-id=54 op=LOAD Feb 12 19:40:26.813000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:40:26.813000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit: BPF prog-id=55 op=LOAD Feb 12 19:40:26.815000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit: BPF prog-id=56 op=LOAD Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.818000 audit: BPF prog-id=57 op=LOAD Feb 12 19:40:26.818000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:40:26.818000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:40:26.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.821000 audit: BPF prog-id=58 op=LOAD Feb 12 19:40:26.821000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit: BPF prog-id=59 op=LOAD Feb 12 19:40:26.823000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit: BPF prog-id=60 op=LOAD Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit: BPF prog-id=61 op=LOAD Feb 12 19:40:26.823000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:40:26.823000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit: BPF prog-id=62 op=LOAD Feb 12 19:40:26.824000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit: BPF prog-id=63 op=LOAD Feb 12 19:40:26.824000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit: BPF prog-id=64 op=LOAD Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit: BPF prog-id=65 op=LOAD Feb 12 19:40:26.825000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:40:26.825000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.825000 audit: BPF prog-id=66 op=LOAD Feb 12 19:40:26.825000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:40:26.837186 systemd[1]: Started kubelet.service. Feb 12 19:40:26.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.878390 kubelet[1672]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:26.878390 kubelet[1672]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:26.879193 kubelet[1672]: I0212 19:40:26.878514 1672 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:40:26.881667 kubelet[1672]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:26.881667 kubelet[1672]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:27.680993 kubelet[1672]: I0212 19:40:27.680960 1672 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:40:27.681154 kubelet[1672]: I0212 19:40:27.681142 1672 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:40:27.681442 kubelet[1672]: I0212 19:40:27.681422 1672 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:40:27.685966 kubelet[1672]: I0212 19:40:27.685941 1672 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:40:27.686138 kubelet[1672]: E0212 19:40:27.686115 1672 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.3:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.688092 kubelet[1672]: W0212 19:40:27.688071 1672 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:40:27.688981 kubelet[1672]: I0212 19:40:27.688960 1672 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:40:27.689388 kubelet[1672]: I0212 19:40:27.689371 1672 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:40:27.689558 kubelet[1672]: I0212 19:40:27.689542 1672 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:40:27.689753 kubelet[1672]: I0212 19:40:27.689740 1672 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:40:27.689814 kubelet[1672]: I0212 19:40:27.689805 1672 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:40:27.690018 kubelet[1672]: I0212 19:40:27.690002 1672 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:27.693835 kubelet[1672]: I0212 19:40:27.693807 1672 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:40:27.693835 kubelet[1672]: I0212 19:40:27.693839 1672 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:40:27.693990 kubelet[1672]: I0212 19:40:27.693979 1672 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:40:27.694017 kubelet[1672]: I0212 19:40:27.693996 1672 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:40:27.695161 kubelet[1672]: W0212 19:40:27.695051 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.3:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.695161 kubelet[1672]: E0212 19:40:27.695091 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.3:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.695445 kubelet[1672]: W0212 19:40:27.695414 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.695485 kubelet[1672]: E0212 19:40:27.695450 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.695571 kubelet[1672]: I0212 19:40:27.695556 1672 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:40:27.696333 kubelet[1672]: W0212 19:40:27.696317 1672 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:40:27.696886 kubelet[1672]: I0212 19:40:27.696813 1672 server.go:1186] "Started kubelet" Feb 12 19:40:27.696921 kubelet[1672]: I0212 19:40:27.696887 1672 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:40:27.697475 kubelet[1672]: I0212 19:40:27.697444 1672 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:40:27.698000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:27.698000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:27.698000 audit[1672]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001090750 a1=4000a015a8 a2=4001090720 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.698000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:27.699010 kubelet[1672]: I0212 19:40:27.698990 1672 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:40:27.698000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:27.698000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:27.698000 audit[1672]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a3ef60 a1=4000a015c0 a2=40010907e0 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.698000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:27.699301 kubelet[1672]: I0212 19:40:27.699261 1672 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:40:27.699459 kubelet[1672]: I0212 19:40:27.699445 1672 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:40:27.700135 kubelet[1672]: E0212 19:40:27.700113 1672 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:40:27.700184 kubelet[1672]: E0212 19:40:27.700148 1672 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:40:27.701000 audit[1684]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.701000 audit[1684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce124970 a2=0 a3=1 items=0 ppid=1672 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:40:27.702562 kubelet[1672]: E0212 19:40:27.702135 1672 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b334e1b4101009", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 27, 696787465, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 27, 696787465, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.3:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.3:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:40:27.702694 kubelet[1672]: I0212 19:40:27.702675 1672 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:40:27.703442 kubelet[1672]: I0212 19:40:27.703415 1672 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:40:27.703796 kubelet[1672]: E0212 19:40:27.703752 1672 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.704781 kubelet[1672]: W0212 19:40:27.704492 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.704854 kubelet[1672]: E0212 19:40:27.704793 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.704000 audit[1685]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.704000 audit[1685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc293f5b0 a2=0 a3=1 items=0 ppid=1672 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:40:27.706000 audit[1688]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.706000 audit[1688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc2ede6c0 a2=0 a3=1 items=0 ppid=1672 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:27.709000 audit[1690]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.709000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeb0ed930 a2=0 a3=1 items=0 ppid=1672 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:27.717000 audit[1694]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.717000 audit[1694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc5b38ba0 a2=0 a3=1 items=0 ppid=1672 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:40:27.718000 audit[1695]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.718000 audit[1695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffeae1c90 a2=0 a3=1 items=0 ppid=1672 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:40:27.722197 kubelet[1672]: I0212 19:40:27.722167 1672 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:40:27.722197 kubelet[1672]: I0212 19:40:27.722184 1672 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:40:27.722197 kubelet[1672]: I0212 19:40:27.722200 1672 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:27.724371 kubelet[1672]: I0212 19:40:27.724142 1672 policy_none.go:49] "None policy: Start" Feb 12 19:40:27.724657 kubelet[1672]: I0212 19:40:27.724631 1672 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:40:27.724657 kubelet[1672]: I0212 19:40:27.724653 1672 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:40:27.725000 audit[1700]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.725000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffddc2fa60 a2=0 a3=1 items=0 ppid=1672 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.725000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:40:27.729000 audit[1704]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.729000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffff0a96b60 a2=0 a3=1 items=0 ppid=1672 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:40:27.730000 audit[1705]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.730000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdb2e4430 a2=0 a3=1 items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:40:27.731461 systemd[1]: Created slice kubepods.slice. Feb 12 19:40:27.732000 audit[1706]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.732000 audit[1706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4e39110 a2=0 a3=1 items=0 ppid=1672 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:40:27.735389 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:40:27.735000 audit[1708]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.735000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdfd8b200 a2=0 a3=1 items=0 ppid=1672 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:40:27.738276 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:40:27.739000 audit[1710]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.739000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffce0112a0 a2=0 a3=1 items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:40:27.741000 audit[1712]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.741000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffe4d593a0 a2=0 a3=1 items=0 ppid=1672 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:40:27.743000 audit[1714]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.743000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff3cdc980 a2=0 a3=1 items=0 ppid=1672 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:40:27.746338 kubelet[1672]: I0212 19:40:27.746300 1672 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:40:27.745000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:27.745000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:27.745000 audit[1672]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010f30b0 a1=40010dd8d8 a2=40010f3080 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.745000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:27.746582 kubelet[1672]: I0212 19:40:27.746374 1672 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:40:27.746000 audit[1716]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.746000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=fffff6b943d0 a2=0 a3=1 items=0 ppid=1672 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:40:27.747103 kubelet[1672]: I0212 19:40:27.747084 1672 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:40:27.747188 kubelet[1672]: I0212 19:40:27.747102 1672 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:40:27.747440 kubelet[1672]: E0212 19:40:27.747417 1672 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 19:40:27.747000 audit[1717]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.747000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffda814740 a2=0 a3=1 items=0 ppid=1672 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.747000 audit[1718]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.747000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7453000 a2=0 a3=1 items=0 ppid=1672 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:40:27.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:40:27.748000 audit[1719]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.748000 audit[1719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6a5ed40 a2=0 a3=1 items=0 ppid=1672 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:40:27.749000 audit[1721]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.749000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff03fa8a0 a2=0 a3=1 items=0 ppid=1672 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.749000 audit[1720]: NETFILTER_CFG table=nat:45 family=10 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.749000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffeb7e4330 a2=0 a3=1 items=0 ppid=1672 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:40:27.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:40:27.751000 audit[1723]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.751000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffdb1dac0 a2=0 a3=1 items=0 ppid=1672 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:40:27.753000 audit[1724]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.753000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc7c86fa0 a2=0 a3=1 items=0 ppid=1672 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:40:27.755000 audit[1726]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.755000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc4e6c850 a2=0 a3=1 items=0 ppid=1672 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:40:27.756000 audit[1727]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.756000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffec320820 a2=0 a3=1 items=0 ppid=1672 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:40:27.757000 audit[1728]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.757000 audit[1728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc28aab20 a2=0 a3=1 items=0 ppid=1672 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:40:27.759000 audit[1730]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.759000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe26c9870 a2=0 a3=1 items=0 ppid=1672 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:40:27.761000 audit[1732]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.761000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc1c59660 a2=0 a3=1 items=0 ppid=1672 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:40:27.763000 audit[1734]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.763000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffddf160a0 a2=0 a3=1 items=0 ppid=1672 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:40:27.765000 audit[1736]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.765000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffca7a93f0 a2=0 a3=1 items=0 ppid=1672 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:40:27.768000 audit[1738]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.768000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffcc098c40 a2=0 a3=1 items=0 ppid=1672 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:40:27.769650 kubelet[1672]: I0212 19:40:27.769631 1672 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:40:27.769744 kubelet[1672]: I0212 19:40:27.769733 1672 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:40:27.769812 kubelet[1672]: I0212 19:40:27.769802 1672 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:40:27.769935 kubelet[1672]: E0212 19:40:27.769924 1672 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:40:27.770166 kubelet[1672]: W0212 19:40:27.770134 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.770225 kubelet[1672]: E0212 19:40:27.770176 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:27.770000 audit[1739]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.770000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff55bef0 a2=0 a3=1 items=0 ppid=1672 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:40:27.771000 audit[1740]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.771000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8fc8420 a2=0 a3=1 items=0 ppid=1672 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:40:27.772000 audit[1741]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.772000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe27b55e0 a2=0 a3=1 items=0 ppid=1672 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:40:27.804917 kubelet[1672]: I0212 19:40:27.804867 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:40:27.805324 kubelet[1672]: E0212 19:40:27.805306 1672 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.3:6443/api/v1/nodes\": dial tcp 10.0.0.3:6443: connect: connection refused" node="localhost" Feb 12 19:40:27.870629 kubelet[1672]: I0212 19:40:27.870608 1672 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:27.871657 kubelet[1672]: I0212 19:40:27.871632 1672 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:27.872865 kubelet[1672]: I0212 19:40:27.872844 1672 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:27.873674 kubelet[1672]: I0212 19:40:27.873654 1672 status_manager.go:698] "Failed to get status for pod" podUID=550020dd9f101bcc23e1d3c651841c4d pod="kube-system/kube-controller-manager-localhost" err="Get \"https://10.0.0.3:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-localhost\": dial tcp 10.0.0.3:6443: connect: connection refused" Feb 12 19:40:27.874484 kubelet[1672]: I0212 19:40:27.874459 1672 status_manager.go:698] "Failed to get status for pod" podUID=72ae17a74a2eae76daac6d298477aff0 pod="kube-system/kube-scheduler-localhost" err="Get \"https://10.0.0.3:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-localhost\": dial tcp 10.0.0.3:6443: connect: connection refused" Feb 12 19:40:27.875954 kubelet[1672]: I0212 19:40:27.875931 1672 status_manager.go:698] "Failed to get status for pod" podUID=1fc41d00c97d14805f04285707cfaa25 pod="kube-system/kube-apiserver-localhost" err="Get \"https://10.0.0.3:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-localhost\": dial tcp 10.0.0.3:6443: connect: connection refused" Feb 12 19:40:27.877908 systemd[1]: Created slice kubepods-burstable-pod550020dd9f101bcc23e1d3c651841c4d.slice. Feb 12 19:40:27.892787 systemd[1]: Created slice kubepods-burstable-pod72ae17a74a2eae76daac6d298477aff0.slice. Feb 12 19:40:27.903647 systemd[1]: Created slice kubepods-burstable-pod1fc41d00c97d14805f04285707cfaa25.slice. Feb 12 19:40:27.904205 kubelet[1672]: E0212 19:40:27.904158 1672 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.004801 kubelet[1672]: I0212 19:40:28.004172 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:28.004801 kubelet[1672]: I0212 19:40:28.004218 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:28.004801 kubelet[1672]: I0212 19:40:28.004240 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:28.004801 kubelet[1672]: I0212 19:40:28.004306 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:28.004801 kubelet[1672]: I0212 19:40:28.004376 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:28.005222 kubelet[1672]: I0212 19:40:28.004420 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:28.005222 kubelet[1672]: I0212 19:40:28.004442 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:28.005222 kubelet[1672]: I0212 19:40:28.004478 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:28.005222 kubelet[1672]: I0212 19:40:28.004518 1672 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72ae17a74a2eae76daac6d298477aff0-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"72ae17a74a2eae76daac6d298477aff0\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:40:28.007606 kubelet[1672]: I0212 19:40:28.007563 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:40:28.007870 kubelet[1672]: E0212 19:40:28.007853 1672 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.3:6443/api/v1/nodes\": dial tcp 10.0.0.3:6443: connect: connection refused" node="localhost" Feb 12 19:40:28.190768 kubelet[1672]: E0212 19:40:28.190741 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:28.191372 env[1153]: time="2024-02-12T19:40:28.191310305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:550020dd9f101bcc23e1d3c651841c4d,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:28.194512 kubelet[1672]: E0212 19:40:28.194482 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:28.195193 env[1153]: time="2024-02-12T19:40:28.194963945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:72ae17a74a2eae76daac6d298477aff0,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:28.205815 kubelet[1672]: E0212 19:40:28.205786 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:28.206165 env[1153]: time="2024-02-12T19:40:28.206135145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1fc41d00c97d14805f04285707cfaa25,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:28.304854 kubelet[1672]: E0212 19:40:28.304763 1672 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.0.0.3:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.409305 kubelet[1672]: I0212 19:40:28.409257 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:40:28.409617 kubelet[1672]: E0212 19:40:28.409590 1672 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.3:6443/api/v1/nodes\": dial tcp 10.0.0.3:6443: connect: connection refused" node="localhost" Feb 12 19:40:28.522159 kubelet[1672]: W0212 19:40:28.522085 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.522159 kubelet[1672]: E0212 19:40:28.522144 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.3:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.644257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1016203028.mount: Deactivated successfully. Feb 12 19:40:28.649230 env[1153]: time="2024-02-12T19:40:28.649189145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.651558 env[1153]: time="2024-02-12T19:40:28.651519385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.652275 env[1153]: time="2024-02-12T19:40:28.652246225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.653555 env[1153]: time="2024-02-12T19:40:28.653521185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.654962 env[1153]: time="2024-02-12T19:40:28.654935025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.655692 env[1153]: time="2024-02-12T19:40:28.655666105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.656447 env[1153]: time="2024-02-12T19:40:28.656420505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.660971 env[1153]: time="2024-02-12T19:40:28.660917025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.662617 env[1153]: time="2024-02-12T19:40:28.662586025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.663234 env[1153]: time="2024-02-12T19:40:28.663210345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.663972 env[1153]: time="2024-02-12T19:40:28.663932505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.667976 env[1153]: time="2024-02-12T19:40:28.667935545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:28.702220 env[1153]: time="2024-02-12T19:40:28.702115865Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:28.702220 env[1153]: time="2024-02-12T19:40:28.702185185Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:28.702220 env[1153]: time="2024-02-12T19:40:28.702196145Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:28.704062 env[1153]: time="2024-02-12T19:40:28.703764705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:28.704062 env[1153]: time="2024-02-12T19:40:28.703794305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:28.704062 env[1153]: time="2024-02-12T19:40:28.703805425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:28.704062 env[1153]: time="2024-02-12T19:40:28.703920385Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ddf0d8b8e26d0dceb002371868beddd65a083aa5b3fe70773c276657d7c2fbd pid=1761 runtime=io.containerd.runc.v2 Feb 12 19:40:28.704062 env[1153]: time="2024-02-12T19:40:28.702683705Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98cb6f467b8dfb3ea80f6416c8d6ebaf1c107c3195a75a916e70748cb33d3617 pid=1760 runtime=io.containerd.runc.v2 Feb 12 19:40:28.705043 env[1153]: time="2024-02-12T19:40:28.704873345Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:28.705043 env[1153]: time="2024-02-12T19:40:28.704904825Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:28.705043 env[1153]: time="2024-02-12T19:40:28.704914905Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:28.705165 env[1153]: time="2024-02-12T19:40:28.705121465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1748879d76cdf030611a15140cf344cf4f999b85a92c83e2bda74a354764098d pid=1775 runtime=io.containerd.runc.v2 Feb 12 19:40:28.717396 systemd[1]: Started cri-containerd-98cb6f467b8dfb3ea80f6416c8d6ebaf1c107c3195a75a916e70748cb33d3617.scope. Feb 12 19:40:28.719377 systemd[1]: Started cri-containerd-0ddf0d8b8e26d0dceb002371868beddd65a083aa5b3fe70773c276657d7c2fbd.scope. Feb 12 19:40:28.735940 systemd[1]: Started cri-containerd-1748879d76cdf030611a15140cf344cf4f999b85a92c83e2bda74a354764098d.scope. Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit: BPF prog-id=67 op=LOAD Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1760 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636236663436376238646662336561383066363431366338643665 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1760 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636236663436376238646662336561383066363431366338643665 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.744000 audit: BPF prog-id=68 op=LOAD Feb 12 19:40:28.744000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1760 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636236663436376238646662336561383066363431366338643665 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit: BPF prog-id=69 op=LOAD Feb 12 19:40:28.746000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1760 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636236663436376238646662336561383066363431366338643665 Feb 12 19:40:28.746000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:40:28.746000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.746000 audit: BPF prog-id=70 op=LOAD Feb 12 19:40:28.746000 audit[1792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1760 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636236663436376238646662336561383066363431366338643665 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.751000 audit: BPF prog-id=71 op=LOAD Feb 12 19:40:28.753155 kubelet[1672]: W0212 19:40:28.752717 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.3:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.753155 kubelet[1672]: E0212 19:40:28.752777 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.3:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.753155 kubelet[1672]: W0212 19:40:28.752787 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.753155 kubelet[1672]: E0212 19:40:28.752814 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.3:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.753000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.753000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1761 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064646630643862386532366430646365623030323337313836386265 Feb 12 19:40:28.753000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.753000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1761 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064646630643862386532366430646365623030323337313836386265 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit: BPF prog-id=72 op=LOAD Feb 12 19:40:28.754000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1761 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064646630643862386532366430646365623030323337313836386265 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.754000 audit: BPF prog-id=73 op=LOAD Feb 12 19:40:28.754000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1761 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064646630643862386532366430646365623030323337313836386265 Feb 12 19:40:28.755000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:40:28.755000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.756000 audit: BPF prog-id=74 op=LOAD Feb 12 19:40:28.756000 audit[1795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1761 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064646630643862386532366430646365623030323337313836386265 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit: BPF prog-id=75 op=LOAD Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1775 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343838373964373663646630333036313161313531343063663334 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1775 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343838373964373663646630333036313161313531343063663334 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit: BPF prog-id=76 op=LOAD Feb 12 19:40:28.763000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1775 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343838373964373663646630333036313161313531343063663334 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.763000 audit: BPF prog-id=77 op=LOAD Feb 12 19:40:28.763000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1775 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343838373964373663646630333036313161313531343063663334 Feb 12 19:40:28.763000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:40:28.763000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.764000 audit: BPF prog-id=78 op=LOAD Feb 12 19:40:28.764000 audit[1796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1775 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343838373964373663646630333036313161313531343063663334 Feb 12 19:40:28.777225 env[1153]: time="2024-02-12T19:40:28.777174265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:550020dd9f101bcc23e1d3c651841c4d,Namespace:kube-system,Attempt:0,} returns sandbox id \"98cb6f467b8dfb3ea80f6416c8d6ebaf1c107c3195a75a916e70748cb33d3617\"" Feb 12 19:40:28.777657 env[1153]: time="2024-02-12T19:40:28.777623505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:72ae17a74a2eae76daac6d298477aff0,Namespace:kube-system,Attempt:0,} returns sandbox id \"0ddf0d8b8e26d0dceb002371868beddd65a083aa5b3fe70773c276657d7c2fbd\"" Feb 12 19:40:28.778085 kubelet[1672]: E0212 19:40:28.778055 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:28.778434 kubelet[1672]: E0212 19:40:28.778361 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:28.780407 env[1153]: time="2024-02-12T19:40:28.780150865Z" level=info msg="CreateContainer within sandbox \"98cb6f467b8dfb3ea80f6416c8d6ebaf1c107c3195a75a916e70748cb33d3617\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:40:28.780563 env[1153]: time="2024-02-12T19:40:28.780534305Z" level=info msg="CreateContainer within sandbox \"0ddf0d8b8e26d0dceb002371868beddd65a083aa5b3fe70773c276657d7c2fbd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:40:28.788218 env[1153]: time="2024-02-12T19:40:28.788180465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1fc41d00c97d14805f04285707cfaa25,Namespace:kube-system,Attempt:0,} returns sandbox id \"1748879d76cdf030611a15140cf344cf4f999b85a92c83e2bda74a354764098d\"" Feb 12 19:40:28.788933 kubelet[1672]: E0212 19:40:28.788808 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:28.790581 env[1153]: time="2024-02-12T19:40:28.790543625Z" level=info msg="CreateContainer within sandbox \"1748879d76cdf030611a15140cf344cf4f999b85a92c83e2bda74a354764098d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:40:28.796906 env[1153]: time="2024-02-12T19:40:28.796871825Z" level=info msg="CreateContainer within sandbox \"0ddf0d8b8e26d0dceb002371868beddd65a083aa5b3fe70773c276657d7c2fbd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"86afa871f2944d0c9d064d0a8ffb0749e5f2619933ea2885368fd41a39665706\"" Feb 12 19:40:28.797538 env[1153]: time="2024-02-12T19:40:28.797490665Z" level=info msg="StartContainer for \"86afa871f2944d0c9d064d0a8ffb0749e5f2619933ea2885368fd41a39665706\"" Feb 12 19:40:28.803661 env[1153]: time="2024-02-12T19:40:28.803623145Z" level=info msg="CreateContainer within sandbox \"98cb6f467b8dfb3ea80f6416c8d6ebaf1c107c3195a75a916e70748cb33d3617\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5dc2efc8219a6cdd86c7a0c4fbf3c33f011580d7e56f9b2ef9f6b7601ac69672\"" Feb 12 19:40:28.804123 env[1153]: time="2024-02-12T19:40:28.804094025Z" level=info msg="StartContainer for \"5dc2efc8219a6cdd86c7a0c4fbf3c33f011580d7e56f9b2ef9f6b7601ac69672\"" Feb 12 19:40:28.806392 env[1153]: time="2024-02-12T19:40:28.806351905Z" level=info msg="CreateContainer within sandbox \"1748879d76cdf030611a15140cf344cf4f999b85a92c83e2bda74a354764098d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3268cc9bcc1462d318a35eee92b9f659fee7e0f8967eb06441fb8a3e349fe390\"" Feb 12 19:40:28.806765 env[1153]: time="2024-02-12T19:40:28.806736625Z" level=info msg="StartContainer for \"3268cc9bcc1462d318a35eee92b9f659fee7e0f8967eb06441fb8a3e349fe390\"" Feb 12 19:40:28.814406 systemd[1]: Started cri-containerd-86afa871f2944d0c9d064d0a8ffb0749e5f2619933ea2885368fd41a39665706.scope. Feb 12 19:40:28.827886 systemd[1]: Started cri-containerd-3268cc9bcc1462d318a35eee92b9f659fee7e0f8967eb06441fb8a3e349fe390.scope. Feb 12 19:40:28.837043 systemd[1]: Started cri-containerd-5dc2efc8219a6cdd86c7a0c4fbf3c33f011580d7e56f9b2ef9f6b7601ac69672.scope. Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit: BPF prog-id=79 op=LOAD Feb 12 19:40:28.852000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.852000 audit[1873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1761 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836616661383731663239343464306339643036346430613866666230 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1761 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836616661383731663239343464306339643036346430613866666230 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit: BPF prog-id=80 op=LOAD Feb 12 19:40:28.853000 audit[1873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1761 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836616661383731663239343464306339643036346430613866666230 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit: BPF prog-id=81 op=LOAD Feb 12 19:40:28.853000 audit[1873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1761 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836616661383731663239343464306339643036346430613866666230 Feb 12 19:40:28.853000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:40:28.853000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.853000 audit: BPF prog-id=82 op=LOAD Feb 12 19:40:28.853000 audit[1873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1761 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836616661383731663239343464306339643036346430613866666230 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.860000 audit: BPF prog-id=83 op=LOAD Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1775 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363863633962636331343632643331386133356565653932623966 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1775 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363863633962636331343632643331386133356565653932623966 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit: BPF prog-id=84 op=LOAD Feb 12 19:40:28.861000 audit[1907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1775 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363863633962636331343632643331386133356565653932623966 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit: BPF prog-id=85 op=LOAD Feb 12 19:40:28.861000 audit[1907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1775 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363863633962636331343632643331386133356565653932623966 Feb 12 19:40:28.861000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:40:28.861000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.861000 audit: BPF prog-id=86 op=LOAD Feb 12 19:40:28.861000 audit[1907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1775 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363863633962636331343632643331386133356565653932623966 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit: BPF prog-id=87 op=LOAD Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1760 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633265666338323139613663646438366337613063346662663363 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1760 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633265666338323139613663646438366337613063346662663363 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.862000 audit: BPF prog-id=88 op=LOAD Feb 12 19:40:28.862000 audit[1891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1760 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633265666338323139613663646438366337613063346662663363 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit: BPF prog-id=89 op=LOAD Feb 12 19:40:28.863000 audit[1891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1760 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633265666338323139613663646438366337613063346662663363 Feb 12 19:40:28.863000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:40:28.863000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:28.863000 audit: BPF prog-id=90 op=LOAD Feb 12 19:40:28.863000 audit[1891]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1760 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:28.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633265666338323139613663646438366337613063346662663363 Feb 12 19:40:28.882991 env[1153]: time="2024-02-12T19:40:28.881224465Z" level=info msg="StartContainer for \"86afa871f2944d0c9d064d0a8ffb0749e5f2619933ea2885368fd41a39665706\" returns successfully" Feb 12 19:40:28.896173 env[1153]: time="2024-02-12T19:40:28.894677945Z" level=info msg="StartContainer for \"5dc2efc8219a6cdd86c7a0c4fbf3c33f011580d7e56f9b2ef9f6b7601ac69672\" returns successfully" Feb 12 19:40:28.899509 kubelet[1672]: W0212 19:40:28.898148 1672 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.899509 kubelet[1672]: E0212 19:40:28.898270 1672 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.3:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.3:6443: connect: connection refused Feb 12 19:40:28.915232 env[1153]: time="2024-02-12T19:40:28.912938825Z" level=info msg="StartContainer for \"3268cc9bcc1462d318a35eee92b9f659fee7e0f8967eb06441fb8a3e349fe390\" returns successfully" Feb 12 19:40:29.211001 kubelet[1672]: I0212 19:40:29.210901 1672 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:40:29.782579 kubelet[1672]: E0212 19:40:29.782548 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:29.785349 kubelet[1672]: E0212 19:40:29.785317 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:29.786364 kubelet[1672]: E0212 19:40:29.786343 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:30.787627 kubelet[1672]: E0212 19:40:30.787596 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:30.787914 kubelet[1672]: E0212 19:40:30.787726 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:30.787959 kubelet[1672]: E0212 19:40:30.787920 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:30.823000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.823000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.823000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400030a060 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:30.823000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:30.823000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40001b3110 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:30.823000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:30.866000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.866000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.866000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=47 a1=40049203f0 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:40:30.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:40:30.866000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=4002a0e040 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:40:30.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:40:30.873000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.873000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=52 a1=40037c7c80 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:40:30.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:40:30.866000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.866000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4004a5a0f0 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:40:30.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:40:30.882000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.882000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4002a323c0 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:40:30.882000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:40:30.883000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:30.883000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4005dced80 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:40:30.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:40:30.906608 kubelet[1672]: I0212 19:40:30.906569 1672 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:40:30.922267 kubelet[1672]: E0212 19:40:30.922223 1672 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 19:40:31.700612 kubelet[1672]: I0212 19:40:31.700571 1672 apiserver.go:52] "Watching apiserver" Feb 12 19:40:31.703683 kubelet[1672]: I0212 19:40:31.703647 1672 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:40:31.724961 kubelet[1672]: I0212 19:40:31.724919 1672 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:40:31.793012 kubelet[1672]: E0212 19:40:31.792959 1672 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:31.793364 kubelet[1672]: E0212 19:40:31.793020 1672 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:31.793419 kubelet[1672]: E0212 19:40:31.793403 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:31.793451 kubelet[1672]: E0212 19:40:31.793431 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:32.793436 kubelet[1672]: E0212 19:40:32.793361 1672 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:33.417374 systemd[1]: Reloading. Feb 12 19:40:33.463652 /usr/lib/systemd/system-generators/torcx-generator[2001]: time="2024-02-12T19:40:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:33.464876 /usr/lib/systemd/system-generators/torcx-generator[2001]: time="2024-02-12T19:40:33Z" level=info msg="torcx already run" Feb 12 19:40:33.524548 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:33.524567 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:33.544102 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:33.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600701 kernel: kauditd_printk_skb: 650 callbacks suppressed Feb 12 19:40:33.600766 kernel: audit: type=1400 audit(1707766833.599:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.604064 kernel: audit: type=1400 audit(1707766833.600:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.604126 kernel: audit: type=1400 audit(1707766833.600:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607468 kernel: audit: type=1400 audit(1707766833.600:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607512 kernel: audit: type=1400 audit(1707766833.600:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.611015 kernel: audit: type=1400 audit(1707766833.600:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.612902 kernel: audit: type=1400 audit(1707766833.600:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.612948 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:40:33.612965 kernel: audit: type=1400 audit(1707766833.600:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615161 kernel: audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:40:33.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit: BPF prog-id=91 op=LOAD Feb 12 19:40:33.602000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit: BPF prog-id=92 op=LOAD Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit: BPF prog-id=93 op=LOAD Feb 12 19:40:33.605000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:40:33.605000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit: BPF prog-id=94 op=LOAD Feb 12 19:40:33.607000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit: BPF prog-id=95 op=LOAD Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.610000 audit: BPF prog-id=96 op=LOAD Feb 12 19:40:33.610000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:40:33.610000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:40:33.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.615000 audit: BPF prog-id=97 op=LOAD Feb 12 19:40:33.615000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.616000 audit: BPF prog-id=98 op=LOAD Feb 12 19:40:33.616000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.617000 audit: BPF prog-id=99 op=LOAD Feb 12 19:40:33.617000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit: BPF prog-id=100 op=LOAD Feb 12 19:40:33.619000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.619000 audit: BPF prog-id=101 op=LOAD Feb 12 19:40:33.619000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit: BPF prog-id=102 op=LOAD Feb 12 19:40:33.620000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit: BPF prog-id=103 op=LOAD Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit: BPF prog-id=104 op=LOAD Feb 12 19:40:33.620000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:40:33.620000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit: BPF prog-id=105 op=LOAD Feb 12 19:40:33.621000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.621000 audit: BPF prog-id=106 op=LOAD Feb 12 19:40:33.621000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit: BPF prog-id=107 op=LOAD Feb 12 19:40:33.622000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit: BPF prog-id=108 op=LOAD Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit: BPF prog-id=109 op=LOAD Feb 12 19:40:33.622000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:40:33.622000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit: BPF prog-id=110 op=LOAD Feb 12 19:40:33.623000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.623000 audit: BPF prog-id=111 op=LOAD Feb 12 19:40:33.623000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:40:33.636759 systemd[1]: Stopping kubelet.service... Feb 12 19:40:33.659912 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:40:33.660121 systemd[1]: Stopped kubelet.service. Feb 12 19:40:33.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:33.660183 systemd[1]: kubelet.service: Consumed 1.145s CPU time. Feb 12 19:40:33.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:33.661934 systemd[1]: Started kubelet.service. Feb 12 19:40:33.724921 kubelet[2039]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:33.724921 kubelet[2039]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:33.729166 kubelet[2039]: I0212 19:40:33.724888 2039 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:40:33.730381 kubelet[2039]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:33.730381 kubelet[2039]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:33.733200 kubelet[2039]: I0212 19:40:33.733175 2039 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:40:33.733292 kubelet[2039]: I0212 19:40:33.733282 2039 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:40:33.733582 kubelet[2039]: I0212 19:40:33.733564 2039 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:40:33.734806 kubelet[2039]: I0212 19:40:33.734784 2039 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:40:33.735542 kubelet[2039]: I0212 19:40:33.735517 2039 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:40:33.737160 kubelet[2039]: W0212 19:40:33.737139 2039 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:40:33.737972 kubelet[2039]: I0212 19:40:33.737952 2039 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:40:33.738223 kubelet[2039]: I0212 19:40:33.738210 2039 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:40:33.738384 kubelet[2039]: I0212 19:40:33.738368 2039 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:40:33.738518 kubelet[2039]: I0212 19:40:33.738487 2039 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:40:33.738582 kubelet[2039]: I0212 19:40:33.738573 2039 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:40:33.738652 kubelet[2039]: I0212 19:40:33.738643 2039 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:33.741349 kubelet[2039]: I0212 19:40:33.741331 2039 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:40:33.741492 kubelet[2039]: I0212 19:40:33.741483 2039 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:40:33.741587 kubelet[2039]: I0212 19:40:33.741577 2039 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:40:33.741644 kubelet[2039]: I0212 19:40:33.741635 2039 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:40:33.742540 kubelet[2039]: I0212 19:40:33.742486 2039 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:40:33.745545 kubelet[2039]: I0212 19:40:33.743138 2039 server.go:1186] "Started kubelet" Feb 12 19:40:33.745000 audit[2039]: AVC avc: denied { mac_admin } for pid=2039 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.745000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:33.745000 audit[2039]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a7f650 a1=400067edc8 a2=4000a7f620 a3=25 items=0 ppid=1 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:33.745000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:33.746000 audit[2039]: AVC avc: denied { mac_admin } for pid=2039 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.746000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:33.746000 audit[2039]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d1c700 a1=400067ede0 a2=4000a7f6e0 a3=25 items=0 ppid=1 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:33.746000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:33.746981 kubelet[2039]: I0212 19:40:33.746544 2039 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:40:33.746981 kubelet[2039]: I0212 19:40:33.746582 2039 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:40:33.746981 kubelet[2039]: I0212 19:40:33.746622 2039 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:40:33.749455 kubelet[2039]: I0212 19:40:33.749414 2039 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:40:33.750449 kubelet[2039]: I0212 19:40:33.750406 2039 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:40:33.751563 kubelet[2039]: E0212 19:40:33.751540 2039 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:40:33.751708 kubelet[2039]: E0212 19:40:33.751696 2039 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:40:33.753137 kubelet[2039]: I0212 19:40:33.753119 2039 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:40:33.753596 kubelet[2039]: I0212 19:40:33.753581 2039 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:40:33.798687 kubelet[2039]: I0212 19:40:33.798662 2039 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:40:33.809152 kubelet[2039]: I0212 19:40:33.809118 2039 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:40:33.809152 kubelet[2039]: I0212 19:40:33.809146 2039 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:40:33.809284 kubelet[2039]: I0212 19:40:33.809162 2039 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:33.809365 kubelet[2039]: I0212 19:40:33.809335 2039 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:40:33.809365 kubelet[2039]: I0212 19:40:33.809353 2039 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:40:33.809365 kubelet[2039]: I0212 19:40:33.809359 2039 policy_none.go:49] "None policy: Start" Feb 12 19:40:33.809923 kubelet[2039]: I0212 19:40:33.809904 2039 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:40:33.810057 kubelet[2039]: I0212 19:40:33.810047 2039 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:40:33.810248 kubelet[2039]: I0212 19:40:33.810233 2039 state_mem.go:75] "Updated machine memory state" Feb 12 19:40:33.814327 kubelet[2039]: I0212 19:40:33.814295 2039 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:40:33.814481 kubelet[2039]: I0212 19:40:33.814464 2039 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:40:33.813000 audit[2039]: AVC avc: denied { mac_admin } for pid=2039 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:33.813000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:33.813000 audit[2039]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40016a4390 a1=40016a9068 a2=40016a4360 a3=25 items=0 ppid=1 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:33.813000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:33.814931 kubelet[2039]: I0212 19:40:33.814914 2039 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:40:33.829987 kubelet[2039]: I0212 19:40:33.829953 2039 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:40:33.829987 kubelet[2039]: I0212 19:40:33.829973 2039 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:40:33.829987 kubelet[2039]: I0212 19:40:33.829994 2039 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:40:33.830129 kubelet[2039]: E0212 19:40:33.830036 2039 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:40:33.857914 kubelet[2039]: I0212 19:40:33.857799 2039 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 19:40:33.870442 kubelet[2039]: I0212 19:40:33.870270 2039 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 19:40:33.870442 kubelet[2039]: I0212 19:40:33.870369 2039 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 19:40:33.930226 kubelet[2039]: I0212 19:40:33.930164 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:33.930385 kubelet[2039]: I0212 19:40:33.930308 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:33.930385 kubelet[2039]: I0212 19:40:33.930347 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:33.946138 kubelet[2039]: E0212 19:40:33.946076 2039 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:33.956374 kubelet[2039]: I0212 19:40:33.956348 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:33.956436 kubelet[2039]: I0212 19:40:33.956386 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:33.956436 kubelet[2039]: I0212 19:40:33.956413 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:33.956436 kubelet[2039]: I0212 19:40:33.956434 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:33.956544 kubelet[2039]: I0212 19:40:33.956454 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1fc41d00c97d14805f04285707cfaa25-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1fc41d00c97d14805f04285707cfaa25\") " pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:33.956544 kubelet[2039]: I0212 19:40:33.956482 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:33.956544 kubelet[2039]: I0212 19:40:33.956514 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:33.956544 kubelet[2039]: I0212 19:40:33.956543 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/550020dd9f101bcc23e1d3c651841c4d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"550020dd9f101bcc23e1d3c651841c4d\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:33.956631 kubelet[2039]: I0212 19:40:33.956566 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72ae17a74a2eae76daac6d298477aff0-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"72ae17a74a2eae76daac6d298477aff0\") " pod="kube-system/kube-scheduler-localhost" Feb 12 19:40:34.058000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:34.058000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400115bf80 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:34.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:34.060000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:34.060000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fd81a0 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:34.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:34.064000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:34.064000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40008fb440 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:34.064000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:34.064000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:34.064000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000afa7e0 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:34.064000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:34.147415 kubelet[2039]: E0212 19:40:34.147377 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:34.236018 kubelet[2039]: E0212 19:40:34.235986 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:34.247310 kubelet[2039]: E0212 19:40:34.247263 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:34.742067 kubelet[2039]: I0212 19:40:34.741984 2039 apiserver.go:52] "Watching apiserver" Feb 12 19:40:34.854803 kubelet[2039]: I0212 19:40:34.854760 2039 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:40:34.861906 kubelet[2039]: I0212 19:40:34.861881 2039 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:40:34.874000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:40:34.874000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001022ec0 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:40:34.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:34.946626 kubelet[2039]: E0212 19:40:34.946589 2039 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Feb 12 19:40:34.946937 kubelet[2039]: E0212 19:40:34.946921 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:35.153775 kubelet[2039]: E0212 19:40:35.153736 2039 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 19:40:35.154267 kubelet[2039]: E0212 19:40:35.154241 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:35.547765 kubelet[2039]: E0212 19:40:35.547658 2039 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 12 19:40:35.548081 kubelet[2039]: E0212 19:40:35.548066 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:35.842539 kubelet[2039]: E0212 19:40:35.842437 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:35.842539 kubelet[2039]: E0212 19:40:35.842485 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:35.843322 kubelet[2039]: E0212 19:40:35.843306 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:36.146996 kubelet[2039]: I0212 19:40:36.146969 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=4.146931625 pod.CreationTimestamp="2024-02-12 19:40:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:36.146591905 +0000 UTC m=+2.479731121" watchObservedRunningTime="2024-02-12 19:40:36.146931625 +0000 UTC m=+2.480070841" Feb 12 19:40:36.147232 kubelet[2039]: I0212 19:40:36.147216 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=3.147196105 pod.CreationTimestamp="2024-02-12 19:40:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:35.753739105 +0000 UTC m=+2.086878321" watchObservedRunningTime="2024-02-12 19:40:36.147196105 +0000 UTC m=+2.480335321" Feb 12 19:40:36.548463 kubelet[2039]: I0212 19:40:36.548356 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.5483175449999997 pod.CreationTimestamp="2024-02-12 19:40:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:36.547651865 +0000 UTC m=+2.880791081" watchObservedRunningTime="2024-02-12 19:40:36.548317545 +0000 UTC m=+2.881456761" Feb 12 19:40:36.843909 kubelet[2039]: E0212 19:40:36.843810 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:38.751825 sudo[1279]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:38.751000 audit[1279]: USER_END pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:38.752859 kernel: kauditd_printk_skb: 265 callbacks suppressed Feb 12 19:40:38.752935 kernel: audit: type=1106 audit(1707766838.751:967): pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:38.751000 audit[1279]: CRED_DISP pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:38.755472 sshd[1275]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:38.757152 kernel: audit: type=1104 audit(1707766838.751:968): pid=1279 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:38.757221 kernel: audit: type=1106 audit(1707766838.754:969): pid=1275 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:38.754000 audit[1275]: USER_END pid=1275 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:38.758179 systemd-logind[1139]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:40:38.758301 systemd[1]: sshd@6-10.0.0.3:22-10.0.0.1:60504.service: Deactivated successfully. Feb 12 19:40:38.758999 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:40:38.759162 systemd[1]: session-7.scope: Consumed 7.060s CPU time. Feb 12 19:40:38.759624 systemd-logind[1139]: Removed session 7. Feb 12 19:40:38.754000 audit[1275]: CRED_DISP pid=1275 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:38.761808 kernel: audit: type=1104 audit(1707766838.754:970): pid=1275 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:40:38.761875 kernel: audit: type=1131 audit(1707766838.757:971): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:38.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:60504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:39.242524 kubelet[2039]: E0212 19:40:39.242440 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:39.327879 kubelet[2039]: E0212 19:40:39.327841 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:39.848743 kubelet[2039]: E0212 19:40:39.848710 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:39.848985 kubelet[2039]: E0212 19:40:39.848967 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:42.515437 kubelet[2039]: E0212 19:40:42.515410 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:42.852681 kubelet[2039]: E0212 19:40:42.852545 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:43.854176 kubelet[2039]: E0212 19:40:43.854141 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:47.433181 kubelet[2039]: I0212 19:40:47.433152 2039 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:40:47.433556 env[1153]: time="2024-02-12T19:40:47.433445495Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:40:47.433882 kubelet[2039]: I0212 19:40:47.433857 2039 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:40:47.559651 kubelet[2039]: I0212 19:40:47.559602 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:47.564635 systemd[1]: Created slice kubepods-besteffort-pod223b7b8e_e0a1_4dbe_82de_2c19da2bb7fc.slice. Feb 12 19:40:47.650134 kubelet[2039]: I0212 19:40:47.650093 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4wlgf\" (UniqueName: \"kubernetes.io/projected/223b7b8e-e0a1-4dbe-82de-2c19da2bb7fc-kube-api-access-4wlgf\") pod \"tigera-operator-cfc98749c-5kxlk\" (UID: \"223b7b8e-e0a1-4dbe-82de-2c19da2bb7fc\") " pod="tigera-operator/tigera-operator-cfc98749c-5kxlk" Feb 12 19:40:47.650134 kubelet[2039]: I0212 19:40:47.650140 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/223b7b8e-e0a1-4dbe-82de-2c19da2bb7fc-var-lib-calico\") pod \"tigera-operator-cfc98749c-5kxlk\" (UID: \"223b7b8e-e0a1-4dbe-82de-2c19da2bb7fc\") " pod="tigera-operator/tigera-operator-cfc98749c-5kxlk" Feb 12 19:40:47.846365 kubelet[2039]: I0212 19:40:47.846244 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:47.851726 systemd[1]: Created slice kubepods-besteffort-pod35722431_6591_4a2d_838a_31556d019a3a.slice. Feb 12 19:40:47.876414 env[1153]: time="2024-02-12T19:40:47.876366169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-5kxlk,Uid:223b7b8e-e0a1-4dbe-82de-2c19da2bb7fc,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:40:47.891282 env[1153]: time="2024-02-12T19:40:47.891208075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:47.891487 env[1153]: time="2024-02-12T19:40:47.891461914Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:47.891612 env[1153]: time="2024-02-12T19:40:47.891589313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:47.891889 env[1153]: time="2024-02-12T19:40:47.891859312Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe366ac33050c6849866a5c65c9bcd7fb8efe22ef2f61156084493e274347245 pid=2161 runtime=io.containerd.runc.v2 Feb 12 19:40:47.906157 systemd[1]: run-containerd-runc-k8s.io-fe366ac33050c6849866a5c65c9bcd7fb8efe22ef2f61156084493e274347245-runc.kmilXa.mount: Deactivated successfully. Feb 12 19:40:47.907744 systemd[1]: Started cri-containerd-fe366ac33050c6849866a5c65c9bcd7fb8efe22ef2f61156084493e274347245.scope. Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937837 kernel: audit: type=1400 audit(1707766847.933:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937916 kernel: audit: type=1400 audit(1707766847.933:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937940 kernel: audit: type=1400 audit(1707766847.933:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.941565 kernel: audit: type=1400 audit(1707766847.933:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.941616 kernel: audit: type=1400 audit(1707766847.933:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.943415 kernel: audit: type=1400 audit(1707766847.933:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.947412 kernel: audit: type=1400 audit(1707766847.933:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.947465 kernel: audit: type=1400 audit(1707766847.933:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.951764 kubelet[2039]: I0212 19:40:47.951738 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/35722431-6591-4a2d-838a-31556d019a3a-xtables-lock\") pod \"kube-proxy-vt7nd\" (UID: \"35722431-6591-4a2d-838a-31556d019a3a\") " pod="kube-system/kube-proxy-vt7nd" Feb 12 19:40:47.951935 kubelet[2039]: I0212 19:40:47.951924 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/35722431-6591-4a2d-838a-31556d019a3a-kube-proxy\") pod \"kube-proxy-vt7nd\" (UID: \"35722431-6591-4a2d-838a-31556d019a3a\") " pod="kube-system/kube-proxy-vt7nd" Feb 12 19:40:47.952089 kubelet[2039]: I0212 19:40:47.952077 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/35722431-6591-4a2d-838a-31556d019a3a-lib-modules\") pod \"kube-proxy-vt7nd\" (UID: \"35722431-6591-4a2d-838a-31556d019a3a\") " pod="kube-system/kube-proxy-vt7nd" Feb 12 19:40:47.952198 kernel: audit: type=1400 audit(1707766847.933:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.952245 kernel: audit: type=1400 audit(1707766847.935:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.952379 kubelet[2039]: I0212 19:40:47.952365 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rmjlv\" (UniqueName: \"kubernetes.io/projected/35722431-6591-4a2d-838a-31556d019a3a-kube-api-access-rmjlv\") pod \"kube-proxy-vt7nd\" (UID: \"35722431-6591-4a2d-838a-31556d019a3a\") " pod="kube-system/kube-proxy-vt7nd" Feb 12 19:40:47.935000 audit: BPF prog-id=112 op=LOAD Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333636616333333035306336383439383636613563363563396263 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333636616333333035306336383439383636613563363563396263 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.935000 audit: BPF prog-id=113 op=LOAD Feb 12 19:40:47.935000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333636616333333035306336383439383636613563363563396263 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.937000 audit: BPF prog-id=114 op=LOAD Feb 12 19:40:47.937000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333636616333333035306336383439383636613563363563396263 Feb 12 19:40:47.939000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:40:47.939000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.939000 audit: BPF prog-id=115 op=LOAD Feb 12 19:40:47.939000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2161 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333636616333333035306336383439383636613563363563396263 Feb 12 19:40:47.963687 env[1153]: time="2024-02-12T19:40:47.963646452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-5kxlk,Uid:223b7b8e-e0a1-4dbe-82de-2c19da2bb7fc,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"fe366ac33050c6849866a5c65c9bcd7fb8efe22ef2f61156084493e274347245\"" Feb 12 19:40:47.965361 env[1153]: time="2024-02-12T19:40:47.965331126Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:40:48.153425 kubelet[2039]: E0212 19:40:48.153396 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:48.153815 env[1153]: time="2024-02-12T19:40:48.153781757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vt7nd,Uid:35722431-6591-4a2d-838a-31556d019a3a,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:48.166842 env[1153]: time="2024-02-12T19:40:48.166779233Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:48.166842 env[1153]: time="2024-02-12T19:40:48.166818553Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:48.166979 env[1153]: time="2024-02-12T19:40:48.166828513Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:48.166979 env[1153]: time="2024-02-12T19:40:48.166939833Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93861e8d469dfd488695c43d1adc505d458c470604c19719e949a98dc1a6e3ab pid=2203 runtime=io.containerd.runc.v2 Feb 12 19:40:48.176333 systemd[1]: Started cri-containerd-93861e8d469dfd488695c43d1adc505d458c470604c19719e949a98dc1a6e3ab.scope. Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.244000 audit: BPF prog-id=116 op=LOAD Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2203 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383631653864343639646664343838363935633433643161646335 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2203 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383631653864343639646664343838363935633433643161646335 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.245000 audit: BPF prog-id=117 op=LOAD Feb 12 19:40:48.245000 audit[2211]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2203 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383631653864343639646664343838363935633433643161646335 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit: BPF prog-id=118 op=LOAD Feb 12 19:40:48.246000 audit[2211]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2203 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383631653864343639646664343838363935633433643161646335 Feb 12 19:40:48.246000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:40:48.246000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.246000 audit: BPF prog-id=119 op=LOAD Feb 12 19:40:48.246000 audit[2211]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2203 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383631653864343639646664343838363935633433643161646335 Feb 12 19:40:48.257417 env[1153]: time="2024-02-12T19:40:48.257375045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vt7nd,Uid:35722431-6591-4a2d-838a-31556d019a3a,Namespace:kube-system,Attempt:0,} returns sandbox id \"93861e8d469dfd488695c43d1adc505d458c470604c19719e949a98dc1a6e3ab\"" Feb 12 19:40:48.258104 kubelet[2039]: E0212 19:40:48.258083 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:48.260093 env[1153]: time="2024-02-12T19:40:48.259875717Z" level=info msg="CreateContainer within sandbox \"93861e8d469dfd488695c43d1adc505d458c470604c19719e949a98dc1a6e3ab\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:40:48.276944 env[1153]: time="2024-02-12T19:40:48.276906019Z" level=info msg="CreateContainer within sandbox \"93861e8d469dfd488695c43d1adc505d458c470604c19719e949a98dc1a6e3ab\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c20388a143a0734f9e60d94deca3f09f2f8b2b0228d81dd1c2d05b804e3e100d\"" Feb 12 19:40:48.278838 env[1153]: time="2024-02-12T19:40:48.278807092Z" level=info msg="StartContainer for \"c20388a143a0734f9e60d94deca3f09f2f8b2b0228d81dd1c2d05b804e3e100d\"" Feb 12 19:40:48.292710 systemd[1]: Started cri-containerd-c20388a143a0734f9e60d94deca3f09f2f8b2b0228d81dd1c2d05b804e3e100d.scope. Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2203 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303338386131343361303733346639653630643934646563613366 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit: BPF prog-id=120 op=LOAD Feb 12 19:40:48.319000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2203 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303338386131343361303733346639653630643934646563613366 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit: BPF prog-id=121 op=LOAD Feb 12 19:40:48.319000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2203 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303338386131343361303733346639653630643934646563613366 Feb 12 19:40:48.319000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:40:48.319000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:48.319000 audit: BPF prog-id=122 op=LOAD Feb 12 19:40:48.319000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2203 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332303338386131343361303733346639653630643934646563613366 Feb 12 19:40:48.342131 env[1153]: time="2024-02-12T19:40:48.342026797Z" level=info msg="StartContainer for \"c20388a143a0734f9e60d94deca3f09f2f8b2b0228d81dd1c2d05b804e3e100d\" returns successfully" Feb 12 19:40:48.434000 audit[2296]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.434000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe454e4a0 a2=0 a3=ffff9c8626c0 items=0 ppid=2256 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:40:48.436000 audit[2298]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.436000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5771bb0 a2=0 a3=ffffb18686c0 items=0 ppid=2256 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:40:48.438000 audit[2297]: NETFILTER_CFG table=mangle:61 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.438000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8f5aae0 a2=0 a3=ffffb2aec6c0 items=0 ppid=2256 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:40:48.440000 audit[2300]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.440000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7399060 a2=0 a3=ffffa1a306c0 items=0 ppid=2256 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:40:48.440000 audit[2299]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.440000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb0a3c10 a2=0 a3=ffff896256c0 items=0 ppid=2256 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:40:48.442000 audit[2302]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.442000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb1bb500 a2=0 a3=ffffb17b86c0 items=0 ppid=2256 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:40:48.537000 audit[2303]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.537000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffef427b80 a2=0 a3=ffffa5ec16c0 items=0 ppid=2256 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:48.540000 audit[2305]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.540000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd6b1a1f0 a2=0 a3=ffffbec9d6c0 items=0 ppid=2256 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:40:48.543000 audit[2308]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.543000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffef012a40 a2=0 a3=ffffa82386c0 items=0 ppid=2256 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:40:48.544000 audit[2309]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.544000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8c1fe00 a2=0 a3=ffffa6c4f6c0 items=0 ppid=2256 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:40:48.546000 audit[2311]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.546000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff49413e0 a2=0 a3=ffffa87436c0 items=0 ppid=2256 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:40:48.547000 audit[2312]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.547000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe51a5770 a2=0 a3=ffff9b3f46c0 items=0 ppid=2256 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:40:48.550000 audit[2314]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.550000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd75acb00 a2=0 a3=ffff9781b6c0 items=0 ppid=2256 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:40:48.553000 audit[2317]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.553000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffde585390 a2=0 a3=ffff84ed36c0 items=0 ppid=2256 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:40:48.554000 audit[2318]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.554000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9936260 a2=0 a3=ffff9624f6c0 items=0 ppid=2256 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:40:48.557000 audit[2320]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.557000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff1ad5170 a2=0 a3=ffffb4c2b6c0 items=0 ppid=2256 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:40:48.557000 audit[2321]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.557000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde7a5190 a2=0 a3=ffff87f536c0 items=0 ppid=2256 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:40:48.560000 audit[2323]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.560000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe9df1010 a2=0 a3=ffffbbba06c0 items=0 ppid=2256 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:48.563000 audit[2326]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.563000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2868e10 a2=0 a3=ffffa01506c0 items=0 ppid=2256 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:48.566000 audit[2329]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.566000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff6ead960 a2=0 a3=ffff831826c0 items=0 ppid=2256 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:40:48.567000 audit[2330]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.567000 audit[2330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc14f8820 a2=0 a3=ffffb9b546c0 items=0 ppid=2256 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:40:48.569000 audit[2332]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.569000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdced8d50 a2=0 a3=ffffafe5f6c0 items=0 ppid=2256 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:48.572000 audit[2335]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:48.572000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc8a3c250 a2=0 a3=ffff941f96c0 items=0 ppid=2256 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:48.581000 audit[2339]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:48.581000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffff34bf4a0 a2=0 a3=ffff9c68b6c0 items=0 ppid=2256 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:48.585000 audit[2339]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:48.585000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff34bf4a0 a2=0 a3=ffff9c68b6c0 items=0 ppid=2256 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:48.627000 audit[2369]: NETFILTER_CFG table=filter:84 family=2 entries=12 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:48.627000 audit[2369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffd432db40 a2=0 a3=ffff83ec36c0 items=0 ppid=2256 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:48.628000 audit[2369]: NETFILTER_CFG table=nat:85 family=2 entries=20 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:48.628000 audit[2369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd432db40 a2=0 a3=ffff83ec36c0 items=0 ppid=2256 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:48.641000 audit[2370]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.641000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe45ec9e0 a2=0 a3=ffff860b86c0 items=0 ppid=2256 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:48.643000 audit[2372]: NETFILTER_CFG table=filter:87 family=10 entries=2 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.643000 audit[2372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5b4e2c0 a2=0 a3=ffffb089d6c0 items=0 ppid=2256 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:40:48.656000 audit[2375]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.656000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff14c9d50 a2=0 a3=ffffa5bdc6c0 items=0 ppid=2256 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:40:48.657000 audit[2376]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.657000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7b76a90 a2=0 a3=ffffa1ab86c0 items=0 ppid=2256 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:40:48.659000 audit[2378]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.659000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe0b5eb00 a2=0 a3=ffff8e36e6c0 items=0 ppid=2256 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:40:48.660000 audit[2379]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.660000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcba60040 a2=0 a3=ffffa3dd86c0 items=0 ppid=2256 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:40:48.662000 audit[2381]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.662000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff67e87d0 a2=0 a3=ffff9e31f6c0 items=0 ppid=2256 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:40:48.665000 audit[2384]: NETFILTER_CFG table=filter:93 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.665000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffece33150 a2=0 a3=ffff8e6a46c0 items=0 ppid=2256 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:40:48.666000 audit[2385]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.666000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc987c400 a2=0 a3=ffffbce7e6c0 items=0 ppid=2256 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:40:48.669000 audit[2387]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.669000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff71ffd20 a2=0 a3=ffff869496c0 items=0 ppid=2256 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:40:48.670000 audit[2388]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.670000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0d3fa20 a2=0 a3=ffffa53156c0 items=0 ppid=2256 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:40:48.672000 audit[2390]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.672000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc4528a0 a2=0 a3=ffffb3daf6c0 items=0 ppid=2256 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:48.675000 audit[2393]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.675000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde4784a0 a2=0 a3=ffff97f976c0 items=0 ppid=2256 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:40:48.678000 audit[2396]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.678000 audit[2396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffef470f30 a2=0 a3=ffffbe05f6c0 items=0 ppid=2256 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:40:48.679000 audit[2397]: NETFILTER_CFG table=nat:100 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.679000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeee07b60 a2=0 a3=ffffbae436c0 items=0 ppid=2256 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:40:48.682000 audit[2399]: NETFILTER_CFG table=nat:101 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.682000 audit[2399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc16572c0 a2=0 a3=ffff989ec6c0 items=0 ppid=2256 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:48.685000 audit[2402]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:48.685000 audit[2402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe4069230 a2=0 a3=ffff899876c0 items=0 ppid=2256 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:48.690000 audit[2406]: NETFILTER_CFG table=filter:103 family=10 entries=3 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:40:48.690000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe80a4140 a2=0 a3=ffff913446c0 items=0 ppid=2256 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.690000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:48.690000 audit[2406]: NETFILTER_CFG table=nat:104 family=10 entries=10 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:40:48.690000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe80a4140 a2=0 a3=ffff913446c0 items=0 ppid=2256 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:48.690000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:48.862624 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount538011844.mount: Deactivated successfully. Feb 12 19:40:48.864010 kubelet[2039]: E0212 19:40:48.863970 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:48.871996 kubelet[2039]: I0212 19:40:48.871955 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vt7nd" podStartSLOduration=1.871927436 pod.CreationTimestamp="2024-02-12 19:40:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:48.871217718 +0000 UTC m=+15.204356934" watchObservedRunningTime="2024-02-12 19:40:48.871927436 +0000 UTC m=+15.205066652" Feb 12 19:40:49.356112 env[1153]: time="2024-02-12T19:40:49.356048506Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:49.358778 env[1153]: time="2024-02-12T19:40:49.358411178Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:49.360233 env[1153]: time="2024-02-12T19:40:49.359981693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:49.362080 env[1153]: time="2024-02-12T19:40:49.362045807Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:49.362728 env[1153]: time="2024-02-12T19:40:49.362699404Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 19:40:49.365966 env[1153]: time="2024-02-12T19:40:49.365933314Z" level=info msg="CreateContainer within sandbox \"fe366ac33050c6849866a5c65c9bcd7fb8efe22ef2f61156084493e274347245\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:40:49.376819 env[1153]: time="2024-02-12T19:40:49.376788240Z" level=info msg="CreateContainer within sandbox \"fe366ac33050c6849866a5c65c9bcd7fb8efe22ef2f61156084493e274347245\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1df964f1d07ed0980bc97f473b96f0fae957f5f9fa66018f6e86f71643c041e3\"" Feb 12 19:40:49.377541 env[1153]: time="2024-02-12T19:40:49.377506557Z" level=info msg="StartContainer for \"1df964f1d07ed0980bc97f473b96f0fae957f5f9fa66018f6e86f71643c041e3\"" Feb 12 19:40:49.396447 systemd[1]: Started cri-containerd-1df964f1d07ed0980bc97f473b96f0fae957f5f9fa66018f6e86f71643c041e3.scope. Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.415000 audit: BPF prog-id=123 op=LOAD Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2161 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663936346631643037656430393830626339376634373362393666 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2161 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663936346631643037656430393830626339376634373362393666 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit: BPF prog-id=124 op=LOAD Feb 12 19:40:49.416000 audit[2415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2161 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663936346631643037656430393830626339376634373362393666 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit: BPF prog-id=125 op=LOAD Feb 12 19:40:49.416000 audit[2415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2161 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663936346631643037656430393830626339376634373362393666 Feb 12 19:40:49.416000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:40:49.416000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.416000 audit: BPF prog-id=126 op=LOAD Feb 12 19:40:49.416000 audit[2415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2161 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663936346631643037656430393830626339376634373362393666 Feb 12 19:40:49.442533 env[1153]: time="2024-02-12T19:40:49.442472750Z" level=info msg="StartContainer for \"1df964f1d07ed0980bc97f473b96f0fae957f5f9fa66018f6e86f71643c041e3\" returns successfully" Feb 12 19:40:49.507586 update_engine[1141]: I0212 19:40:49.507468 1141 update_attempter.cc:509] Updating boot flags... Feb 12 19:40:49.871516 kubelet[2039]: E0212 19:40:49.870658 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:52.261000 audit[2486]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.261000 audit[2486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd71e6e40 a2=0 a3=ffff85af06c0 items=0 ppid=2256 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.263000 audit[2486]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.263000 audit[2486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd71e6e40 a2=0 a3=ffff85af06c0 items=0 ppid=2256 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.296000 audit[2512]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.296000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd64e3150 a2=0 a3=ffffa2a596c0 items=0 ppid=2256 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.297000 audit[2512]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.297000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd64e3150 a2=0 a3=ffffa2a596c0 items=0 ppid=2256 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.358361 kubelet[2039]: I0212 19:40:52.358321 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-5kxlk" podStartSLOduration=-9.223372031496504e+09 pod.CreationTimestamp="2024-02-12 19:40:47 +0000 UTC" firstStartedPulling="2024-02-12 19:40:47.964735248 +0000 UTC m=+14.297874464" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:49.87861068 +0000 UTC m=+16.211749896" watchObservedRunningTime="2024-02-12 19:40:52.358272563 +0000 UTC m=+18.691411779" Feb 12 19:40:52.358899 kubelet[2039]: I0212 19:40:52.358491 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:52.363460 systemd[1]: Created slice kubepods-besteffort-podc9bb71d8_a9b6_4909_b2a1_4021756271eb.slice. Feb 12 19:40:52.384159 kubelet[2039]: I0212 19:40:52.384119 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hkn9v\" (UniqueName: \"kubernetes.io/projected/c9bb71d8-a9b6-4909-b2a1-4021756271eb-kube-api-access-hkn9v\") pod \"calico-typha-6c6855cc6c-c4pfk\" (UID: \"c9bb71d8-a9b6-4909-b2a1-4021756271eb\") " pod="calico-system/calico-typha-6c6855cc6c-c4pfk" Feb 12 19:40:52.384442 kubelet[2039]: I0212 19:40:52.384426 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c9bb71d8-a9b6-4909-b2a1-4021756271eb-typha-certs\") pod \"calico-typha-6c6855cc6c-c4pfk\" (UID: \"c9bb71d8-a9b6-4909-b2a1-4021756271eb\") " pod="calico-system/calico-typha-6c6855cc6c-c4pfk" Feb 12 19:40:52.384611 kubelet[2039]: I0212 19:40:52.384569 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c9bb71d8-a9b6-4909-b2a1-4021756271eb-tigera-ca-bundle\") pod \"calico-typha-6c6855cc6c-c4pfk\" (UID: \"c9bb71d8-a9b6-4909-b2a1-4021756271eb\") " pod="calico-system/calico-typha-6c6855cc6c-c4pfk" Feb 12 19:40:52.409857 kubelet[2039]: I0212 19:40:52.409823 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:52.414921 systemd[1]: Created slice kubepods-besteffort-pod80b1f3ba_b3bc_44b4_86e3_31c1812d0af2.slice. Feb 12 19:40:52.485731 kubelet[2039]: I0212 19:40:52.485670 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-flexvol-driver-host\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.485930 kubelet[2039]: I0212 19:40:52.485777 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-xtables-lock\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.485930 kubelet[2039]: I0212 19:40:52.485855 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-var-lib-calico\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.485930 kubelet[2039]: I0212 19:40:52.485885 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-lib-modules\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.485930 kubelet[2039]: I0212 19:40:52.485921 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8lzr4\" (UniqueName: \"kubernetes.io/projected/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-kube-api-access-8lzr4\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.486362 kubelet[2039]: I0212 19:40:52.486324 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-tigera-ca-bundle\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.486362 kubelet[2039]: I0212 19:40:52.486364 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-cni-bin-dir\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.486471 kubelet[2039]: I0212 19:40:52.486385 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-cni-log-dir\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.486471 kubelet[2039]: I0212 19:40:52.486404 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-node-certs\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.486568 kubelet[2039]: I0212 19:40:52.486548 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-var-run-calico\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.486604 kubelet[2039]: I0212 19:40:52.486578 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-cni-net-dir\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.487557 kubelet[2039]: I0212 19:40:52.487531 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/80b1f3ba-b3bc-44b4-86e3-31c1812d0af2-policysync\") pod \"calico-node-ktqc9\" (UID: \"80b1f3ba-b3bc-44b4-86e3-31c1812d0af2\") " pod="calico-system/calico-node-ktqc9" Feb 12 19:40:52.520650 kubelet[2039]: I0212 19:40:52.520549 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:40:52.521753 kubelet[2039]: E0212 19:40:52.521732 2039 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:40:52.588351 kubelet[2039]: I0212 19:40:52.588138 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d948f890-19cf-423e-b6f0-7d2d5941a3ee-kubelet-dir\") pod \"csi-node-driver-qpv5w\" (UID: \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\") " pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:40:52.589093 kubelet[2039]: E0212 19:40:52.589076 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.589208 kubelet[2039]: W0212 19:40:52.589192 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.589300 kubelet[2039]: E0212 19:40:52.589289 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.589606 kubelet[2039]: E0212 19:40:52.589593 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.589700 kubelet[2039]: W0212 19:40:52.589688 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.589780 kubelet[2039]: E0212 19:40:52.589771 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.590024 kubelet[2039]: E0212 19:40:52.590009 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.590024 kubelet[2039]: W0212 19:40:52.590024 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.590163 kubelet[2039]: E0212 19:40:52.590044 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.590222 kubelet[2039]: E0212 19:40:52.590208 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.590222 kubelet[2039]: W0212 19:40:52.590218 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.590296 kubelet[2039]: E0212 19:40:52.590232 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.590471 kubelet[2039]: E0212 19:40:52.590407 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.590471 kubelet[2039]: W0212 19:40:52.590417 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.590471 kubelet[2039]: E0212 19:40:52.590430 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.590912 kubelet[2039]: E0212 19:40:52.590898 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.590912 kubelet[2039]: W0212 19:40:52.590911 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.591003 kubelet[2039]: E0212 19:40:52.590929 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.591171 kubelet[2039]: E0212 19:40:52.591154 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.591171 kubelet[2039]: W0212 19:40:52.591166 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.591249 kubelet[2039]: E0212 19:40:52.591189 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.591249 kubelet[2039]: I0212 19:40:52.591212 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d948f890-19cf-423e-b6f0-7d2d5941a3ee-varrun\") pod \"csi-node-driver-qpv5w\" (UID: \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\") " pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:40:52.591404 kubelet[2039]: E0212 19:40:52.591388 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.591404 kubelet[2039]: W0212 19:40:52.591401 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.591490 kubelet[2039]: E0212 19:40:52.591430 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.591580 kubelet[2039]: E0212 19:40:52.591567 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.591580 kubelet[2039]: W0212 19:40:52.591578 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.591701 kubelet[2039]: E0212 19:40:52.591686 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.591781 kubelet[2039]: E0212 19:40:52.591720 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.591856 kubelet[2039]: W0212 19:40:52.591844 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.591919 kubelet[2039]: E0212 19:40:52.591904 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.592341 kubelet[2039]: E0212 19:40:52.592325 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.592448 kubelet[2039]: W0212 19:40:52.592434 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.592591 kubelet[2039]: E0212 19:40:52.592576 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.592845 kubelet[2039]: E0212 19:40:52.592833 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.592928 kubelet[2039]: W0212 19:40:52.592916 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.593000 kubelet[2039]: E0212 19:40:52.592990 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.593197 kubelet[2039]: E0212 19:40:52.593184 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.593287 kubelet[2039]: W0212 19:40:52.593275 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.593401 kubelet[2039]: E0212 19:40:52.593387 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.593808 kubelet[2039]: E0212 19:40:52.593769 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.593938 kubelet[2039]: W0212 19:40:52.593881 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.594018 kubelet[2039]: E0212 19:40:52.594009 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.594271 kubelet[2039]: E0212 19:40:52.594258 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.594371 kubelet[2039]: W0212 19:40:52.594358 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.594539 kubelet[2039]: E0212 19:40:52.594482 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.594656 kubelet[2039]: E0212 19:40:52.594645 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.594721 kubelet[2039]: W0212 19:40:52.594710 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.594816 kubelet[2039]: E0212 19:40:52.594801 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.594997 kubelet[2039]: E0212 19:40:52.594982 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.595071 kubelet[2039]: W0212 19:40:52.595059 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.595218 kubelet[2039]: E0212 19:40:52.595196 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.595332 kubelet[2039]: E0212 19:40:52.595320 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.595391 kubelet[2039]: W0212 19:40:52.595381 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.595449 kubelet[2039]: E0212 19:40:52.595440 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.595684 kubelet[2039]: E0212 19:40:52.595672 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.595775 kubelet[2039]: W0212 19:40:52.595762 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.595838 kubelet[2039]: E0212 19:40:52.595829 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.596052 kubelet[2039]: E0212 19:40:52.596039 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.596127 kubelet[2039]: W0212 19:40:52.596114 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.596205 kubelet[2039]: E0212 19:40:52.596195 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.596278 kubelet[2039]: I0212 19:40:52.596266 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d948f890-19cf-423e-b6f0-7d2d5941a3ee-registration-dir\") pod \"csi-node-driver-qpv5w\" (UID: \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\") " pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:40:52.596556 kubelet[2039]: E0212 19:40:52.596542 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.596627 kubelet[2039]: W0212 19:40:52.596615 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.596754 kubelet[2039]: E0212 19:40:52.596730 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.596800 kubelet[2039]: I0212 19:40:52.596764 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pxkjz\" (UniqueName: \"kubernetes.io/projected/d948f890-19cf-423e-b6f0-7d2d5941a3ee-kube-api-access-pxkjz\") pod \"csi-node-driver-qpv5w\" (UID: \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\") " pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:40:52.596878 kubelet[2039]: E0212 19:40:52.596865 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.596939 kubelet[2039]: W0212 19:40:52.596929 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.597029 kubelet[2039]: E0212 19:40:52.597012 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.597211 kubelet[2039]: E0212 19:40:52.597199 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.597280 kubelet[2039]: W0212 19:40:52.597268 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.597339 kubelet[2039]: E0212 19:40:52.597331 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.597568 kubelet[2039]: E0212 19:40:52.597555 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.597652 kubelet[2039]: W0212 19:40:52.597639 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.597766 kubelet[2039]: E0212 19:40:52.597755 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.597991 kubelet[2039]: E0212 19:40:52.597979 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.598192 kubelet[2039]: W0212 19:40:52.598171 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.598295 kubelet[2039]: E0212 19:40:52.598285 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.598740 kubelet[2039]: E0212 19:40:52.598724 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.598859 kubelet[2039]: W0212 19:40:52.598844 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.598930 kubelet[2039]: E0212 19:40:52.598919 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.599177 kubelet[2039]: E0212 19:40:52.599164 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.599249 kubelet[2039]: W0212 19:40:52.599236 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.599317 kubelet[2039]: E0212 19:40:52.599307 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.599563 kubelet[2039]: E0212 19:40:52.599545 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.599563 kubelet[2039]: W0212 19:40:52.599560 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.599646 kubelet[2039]: E0212 19:40:52.599574 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.599719 kubelet[2039]: E0212 19:40:52.599701 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.599719 kubelet[2039]: W0212 19:40:52.599717 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.599772 kubelet[2039]: E0212 19:40:52.599727 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.599924 kubelet[2039]: E0212 19:40:52.599912 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.599924 kubelet[2039]: W0212 19:40:52.599923 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.599995 kubelet[2039]: E0212 19:40:52.599933 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.600101 kubelet[2039]: E0212 19:40:52.600089 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.600101 kubelet[2039]: W0212 19:40:52.600099 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.600177 kubelet[2039]: E0212 19:40:52.600109 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.600294 kubelet[2039]: E0212 19:40:52.600282 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.600294 kubelet[2039]: W0212 19:40:52.600292 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.600359 kubelet[2039]: E0212 19:40:52.600306 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.600444 kubelet[2039]: E0212 19:40:52.600432 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.600481 kubelet[2039]: W0212 19:40:52.600442 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.600481 kubelet[2039]: E0212 19:40:52.600457 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.600612 kubelet[2039]: E0212 19:40:52.600601 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.600649 kubelet[2039]: W0212 19:40:52.600615 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.600649 kubelet[2039]: E0212 19:40:52.600628 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.600649 kubelet[2039]: I0212 19:40:52.600648 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d948f890-19cf-423e-b6f0-7d2d5941a3ee-socket-dir\") pod \"csi-node-driver-qpv5w\" (UID: \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\") " pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:40:52.600897 kubelet[2039]: E0212 19:40:52.600885 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.600897 kubelet[2039]: W0212 19:40:52.600897 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.601065 kubelet[2039]: E0212 19:40:52.600913 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.601130 kubelet[2039]: E0212 19:40:52.601115 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.601170 kubelet[2039]: W0212 19:40:52.601130 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.601170 kubelet[2039]: E0212 19:40:52.601159 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.601334 kubelet[2039]: E0212 19:40:52.601323 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.601334 kubelet[2039]: W0212 19:40:52.601334 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.601400 kubelet[2039]: E0212 19:40:52.601345 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.601481 kubelet[2039]: E0212 19:40:52.601469 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.601481 kubelet[2039]: W0212 19:40:52.601481 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.601666 kubelet[2039]: E0212 19:40:52.601490 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.601720 kubelet[2039]: E0212 19:40:52.601703 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.601720 kubelet[2039]: W0212 19:40:52.601715 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.601863 kubelet[2039]: E0212 19:40:52.601830 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.601863 kubelet[2039]: W0212 19:40:52.601838 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.601967 kubelet[2039]: E0212 19:40:52.601950 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.602035 kubelet[2039]: E0212 19:40:52.601962 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.602088 kubelet[2039]: W0212 19:40:52.602077 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.602220 kubelet[2039]: E0212 19:40:52.601971 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.602220 kubelet[2039]: E0212 19:40:52.602182 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.604526 kubelet[2039]: E0212 19:40:52.603580 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.604526 kubelet[2039]: W0212 19:40:52.603595 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.604526 kubelet[2039]: E0212 19:40:52.603688 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.604526 kubelet[2039]: E0212 19:40:52.603825 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.604526 kubelet[2039]: W0212 19:40:52.603835 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.604526 kubelet[2039]: E0212 19:40:52.603968 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.604526 kubelet[2039]: W0212 19:40:52.603977 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.604526 kubelet[2039]: E0212 19:40:52.604103 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.604526 kubelet[2039]: W0212 19:40:52.604110 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.604526 kubelet[2039]: E0212 19:40:52.604250 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.604810 kubelet[2039]: W0212 19:40:52.604259 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.604810 kubelet[2039]: E0212 19:40:52.604271 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.604810 kubelet[2039]: E0212 19:40:52.604403 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.604810 kubelet[2039]: W0212 19:40:52.604411 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.604810 kubelet[2039]: E0212 19:40:52.604423 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.604981 kubelet[2039]: E0212 19:40:52.604963 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.605049 kubelet[2039]: E0212 19:40:52.605039 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.605125 kubelet[2039]: E0212 19:40:52.605116 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.605351 kubelet[2039]: E0212 19:40:52.605324 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.605351 kubelet[2039]: W0212 19:40:52.605343 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.605431 kubelet[2039]: E0212 19:40:52.605363 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.611492 kubelet[2039]: E0212 19:40:52.611466 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.611492 kubelet[2039]: W0212 19:40:52.611486 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.611642 kubelet[2039]: E0212 19:40:52.611523 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.611761 kubelet[2039]: E0212 19:40:52.611733 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.611761 kubelet[2039]: W0212 19:40:52.611744 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.611823 kubelet[2039]: E0212 19:40:52.611814 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.612599 kubelet[2039]: E0212 19:40:52.612580 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.612599 kubelet[2039]: W0212 19:40:52.612593 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.612733 kubelet[2039]: E0212 19:40:52.612635 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.612770 kubelet[2039]: E0212 19:40:52.612754 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.612770 kubelet[2039]: W0212 19:40:52.612764 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.612861 kubelet[2039]: E0212 19:40:52.612846 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.612929 kubelet[2039]: E0212 19:40:52.612918 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.612929 kubelet[2039]: W0212 19:40:52.612927 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.612988 kubelet[2039]: E0212 19:40:52.612941 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.613124 kubelet[2039]: E0212 19:40:52.613110 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.613124 kubelet[2039]: W0212 19:40:52.613120 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.613212 kubelet[2039]: E0212 19:40:52.613143 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.666100 kubelet[2039]: E0212 19:40:52.666072 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:52.667022 env[1153]: time="2024-02-12T19:40:52.666983952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c6855cc6c-c4pfk,Uid:c9bb71d8-a9b6-4909-b2a1-4021756271eb,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:52.701838 kubelet[2039]: E0212 19:40:52.701807 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.701838 kubelet[2039]: W0212 19:40:52.701829 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.701994 kubelet[2039]: E0212 19:40:52.701852 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.702061 kubelet[2039]: E0212 19:40:52.702048 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.702061 kubelet[2039]: W0212 19:40:52.702059 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.702155 kubelet[2039]: E0212 19:40:52.702071 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.702274 kubelet[2039]: E0212 19:40:52.702258 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.702274 kubelet[2039]: W0212 19:40:52.702270 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.702338 kubelet[2039]: E0212 19:40:52.702281 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.702483 kubelet[2039]: E0212 19:40:52.702468 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.702483 kubelet[2039]: W0212 19:40:52.702478 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.702579 kubelet[2039]: E0212 19:40:52.702489 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.702664 kubelet[2039]: E0212 19:40:52.702651 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.702664 kubelet[2039]: W0212 19:40:52.702660 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.702728 kubelet[2039]: E0212 19:40:52.702671 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.703062 kubelet[2039]: E0212 19:40:52.703031 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.703062 kubelet[2039]: W0212 19:40:52.703046 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.703062 kubelet[2039]: E0212 19:40:52.703063 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.703302 kubelet[2039]: E0212 19:40:52.703268 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.703302 kubelet[2039]: W0212 19:40:52.703283 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.703302 kubelet[2039]: E0212 19:40:52.703298 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.703586 kubelet[2039]: E0212 19:40:52.703573 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.703586 kubelet[2039]: W0212 19:40:52.703587 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.703653 kubelet[2039]: E0212 19:40:52.703604 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.704071 kubelet[2039]: E0212 19:40:52.704056 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.704128 kubelet[2039]: W0212 19:40:52.704071 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.704210 kubelet[2039]: E0212 19:40:52.704191 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.704286 kubelet[2039]: E0212 19:40:52.704269 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.704286 kubelet[2039]: W0212 19:40:52.704282 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.704374 kubelet[2039]: E0212 19:40:52.704363 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.704473 kubelet[2039]: E0212 19:40:52.704461 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.704473 kubelet[2039]: W0212 19:40:52.704473 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.704576 kubelet[2039]: E0212 19:40:52.704563 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.704664 kubelet[2039]: E0212 19:40:52.704652 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.704664 kubelet[2039]: W0212 19:40:52.704663 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.704750 kubelet[2039]: E0212 19:40:52.704739 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.704848 kubelet[2039]: E0212 19:40:52.704837 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.704848 kubelet[2039]: W0212 19:40:52.704847 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.704934 kubelet[2039]: E0212 19:40:52.704923 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.705007 kubelet[2039]: E0212 19:40:52.704996 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.705007 kubelet[2039]: W0212 19:40:52.705006 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.705075 kubelet[2039]: E0212 19:40:52.705022 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.705184 kubelet[2039]: E0212 19:40:52.705173 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.705184 kubelet[2039]: W0212 19:40:52.705184 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.705247 kubelet[2039]: E0212 19:40:52.705197 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.705342 kubelet[2039]: E0212 19:40:52.705325 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.705342 kubelet[2039]: W0212 19:40:52.705335 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.705342 kubelet[2039]: E0212 19:40:52.705344 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.705504 kubelet[2039]: E0212 19:40:52.705486 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.705542 kubelet[2039]: W0212 19:40:52.705508 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.705542 kubelet[2039]: E0212 19:40:52.705532 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.705772 kubelet[2039]: E0212 19:40:52.705760 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.705772 kubelet[2039]: W0212 19:40:52.705771 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.705849 kubelet[2039]: E0212 19:40:52.705785 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.705917 kubelet[2039]: E0212 19:40:52.705909 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.705917 kubelet[2039]: W0212 19:40:52.705917 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.705980 kubelet[2039]: E0212 19:40:52.705947 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.706070 kubelet[2039]: E0212 19:40:52.706060 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.706070 kubelet[2039]: W0212 19:40:52.706070 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.706179 kubelet[2039]: E0212 19:40:52.706163 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.706245 kubelet[2039]: E0212 19:40:52.706212 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.706301 kubelet[2039]: W0212 19:40:52.706290 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.706451 kubelet[2039]: E0212 19:40:52.706427 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.706596 kubelet[2039]: E0212 19:40:52.706583 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.706660 kubelet[2039]: W0212 19:40:52.706649 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.706734 kubelet[2039]: E0212 19:40:52.706724 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.706962 kubelet[2039]: E0212 19:40:52.706948 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.707035 kubelet[2039]: W0212 19:40:52.707022 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.707097 kubelet[2039]: E0212 19:40:52.707088 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.707371 kubelet[2039]: E0212 19:40:52.707358 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.707446 kubelet[2039]: W0212 19:40:52.707434 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.707537 kubelet[2039]: E0212 19:40:52.707526 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.707780 kubelet[2039]: E0212 19:40:52.707767 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.707855 kubelet[2039]: W0212 19:40:52.707842 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.707913 kubelet[2039]: E0212 19:40:52.707904 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.714063 kubelet[2039]: E0212 19:40:52.714030 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.714177 kubelet[2039]: W0212 19:40:52.714160 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.714288 kubelet[2039]: E0212 19:40:52.714276 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.729729 env[1153]: time="2024-02-12T19:40:52.729659148Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:52.729729 env[1153]: time="2024-02-12T19:40:52.729702348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:52.729729 env[1153]: time="2024-02-12T19:40:52.729713028Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:52.729917 env[1153]: time="2024-02-12T19:40:52.729845067Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cdd9ba2486aa3a2335c57724f0429f767993b0bafdecca7b504d51cb64dd96b1 pid=2603 runtime=io.containerd.runc.v2 Feb 12 19:40:52.746548 systemd[1]: Started cri-containerd-cdd9ba2486aa3a2335c57724f0429f767993b0bafdecca7b504d51cb64dd96b1.scope. Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.766000 audit: BPF prog-id=127 op=LOAD Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2603 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643962613234383661613361323333356335373732346630343239 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2603 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643962613234383661613361323333356335373732346630343239 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit: BPF prog-id=128 op=LOAD Feb 12 19:40:52.769000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2603 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643962613234383661613361323333356335373732346630343239 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit: BPF prog-id=129 op=LOAD Feb 12 19:40:52.769000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2603 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643962613234383661613361323333356335373732346630343239 Feb 12 19:40:52.769000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:40:52.769000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { perfmon } for pid=2613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit[2613]: AVC avc: denied { bpf } for pid=2613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:52.769000 audit: BPF prog-id=130 op=LOAD Feb 12 19:40:52.769000 audit[2613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2603 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643962613234383661613361323333356335373732346630343239 Feb 12 19:40:52.802412 env[1153]: time="2024-02-12T19:40:52.802365877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6c6855cc6c-c4pfk,Uid:c9bb71d8-a9b6-4909-b2a1-4021756271eb,Namespace:calico-system,Attempt:0,} returns sandbox id \"cdd9ba2486aa3a2335c57724f0429f767993b0bafdecca7b504d51cb64dd96b1\"" Feb 12 19:40:52.803364 kubelet[2039]: E0212 19:40:52.803181 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:52.804017 kubelet[2039]: E0212 19:40:52.803786 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.804017 kubelet[2039]: W0212 19:40:52.803809 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.804017 kubelet[2039]: E0212 19:40:52.803829 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.804017 kubelet[2039]: E0212 19:40:52.804006 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.804017 kubelet[2039]: W0212 19:40:52.804014 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.804017 kubelet[2039]: E0212 19:40:52.804025 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.804246 env[1153]: time="2024-02-12T19:40:52.804167712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:40:52.905206 kubelet[2039]: E0212 19:40:52.905177 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.905383 kubelet[2039]: W0212 19:40:52.905367 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.905454 kubelet[2039]: E0212 19:40:52.905444 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.905787 kubelet[2039]: E0212 19:40:52.905773 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.905887 kubelet[2039]: W0212 19:40:52.905875 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.905951 kubelet[2039]: E0212 19:40:52.905942 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:52.972020 kubelet[2039]: E0212 19:40:52.971996 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:52.972199 kubelet[2039]: W0212 19:40:52.972182 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:52.972279 kubelet[2039]: E0212 19:40:52.972267 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:53.006909 kubelet[2039]: E0212 19:40:53.006883 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:53.007081 kubelet[2039]: W0212 19:40:53.007065 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:53.007158 kubelet[2039]: E0212 19:40:53.007136 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:53.017148 kubelet[2039]: E0212 19:40:53.017113 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:53.018155 env[1153]: time="2024-02-12T19:40:53.018104713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ktqc9,Uid:80b1f3ba-b3bc-44b4-86e3-31c1812d0af2,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:53.040309 env[1153]: time="2024-02-12T19:40:53.040156859Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:53.040309 env[1153]: time="2024-02-12T19:40:53.040204219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:53.040473 env[1153]: time="2024-02-12T19:40:53.040215979Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:53.041193 env[1153]: time="2024-02-12T19:40:53.040869737Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99 pid=2649 runtime=io.containerd.runc.v2 Feb 12 19:40:53.056131 systemd[1]: Started cri-containerd-37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99.scope. Feb 12 19:40:53.072698 kernel: kauditd_printk_skb: 411 callbacks suppressed Feb 12 19:40:53.072815 kernel: audit: type=1400 audit(1707766853.071:1100): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.076041 kernel: audit: type=1400 audit(1707766853.071:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.076113 kernel: audit: type=1400 audit(1707766853.071:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.077857 kernel: audit: type=1400 audit(1707766853.071:1103): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.079735 kernel: audit: type=1400 audit(1707766853.071:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.083874 kernel: audit: type=1400 audit(1707766853.071:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.086004 kernel: audit: type=1400 audit(1707766853.071:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.086062 kernel: audit: type=1400 audit(1707766853.071:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.088014 kernel: audit: type=1400 audit(1707766853.071:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.090448 kernel: audit: type=1400 audit(1707766853.072:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit: BPF prog-id=131 op=LOAD Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2649 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337626236613939656332353066396239383435626562626534376633 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2649 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337626236613939656332353066396239383435626562626534376633 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.072000 audit: BPF prog-id=132 op=LOAD Feb 12 19:40:53.072000 audit[2657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2649 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337626236613939656332353066396239383435626562626534376633 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.073000 audit: BPF prog-id=133 op=LOAD Feb 12 19:40:53.073000 audit[2657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2649 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337626236613939656332353066396239383435626562626534376633 Feb 12 19:40:53.075000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:40:53.075000 audit: BPF prog-id=132 op=UNLOAD Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.075000 audit: BPF prog-id=134 op=LOAD Feb 12 19:40:53.075000 audit[2657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2649 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337626236613939656332353066396239383435626562626534376633 Feb 12 19:40:53.106787 env[1153]: time="2024-02-12T19:40:53.106745815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ktqc9,Uid:80b1f3ba-b3bc-44b4-86e3-31c1812d0af2,Namespace:calico-system,Attempt:0,} returns sandbox id \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\"" Feb 12 19:40:53.107788 kubelet[2039]: E0212 19:40:53.107580 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:53.107788 kubelet[2039]: E0212 19:40:53.107587 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:53.107788 kubelet[2039]: W0212 19:40:53.107724 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:53.107788 kubelet[2039]: E0212 19:40:53.107744 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:53.171073 kubelet[2039]: E0212 19:40:53.171045 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:53.171073 kubelet[2039]: W0212 19:40:53.171070 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:53.171249 kubelet[2039]: E0212 19:40:53.171090 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:53.348000 audit[2710]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:53.348000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffea436e20 a2=0 a3=ffffa54656c0 items=0 ppid=2256 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:53.349000 audit[2710]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:53.349000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffea436e20 a2=0 a3=ffffa54656c0 items=0 ppid=2256 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:53.832700 kubelet[2039]: E0212 19:40:53.832431 2039 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:40:54.062648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1444205942.mount: Deactivated successfully. Feb 12 19:40:54.816076 env[1153]: time="2024-02-12T19:40:54.814424496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:54.816076 env[1153]: time="2024-02-12T19:40:54.815731973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:54.817078 env[1153]: time="2024-02-12T19:40:54.817028570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:54.820200 env[1153]: time="2024-02-12T19:40:54.818226967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:54.820200 env[1153]: time="2024-02-12T19:40:54.819355605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 19:40:54.820325 env[1153]: time="2024-02-12T19:40:54.820229003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:40:54.830731 env[1153]: time="2024-02-12T19:40:54.830686698Z" level=info msg="CreateContainer within sandbox \"cdd9ba2486aa3a2335c57724f0429f767993b0bafdecca7b504d51cb64dd96b1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:40:54.840360 env[1153]: time="2024-02-12T19:40:54.840309916Z" level=info msg="CreateContainer within sandbox \"cdd9ba2486aa3a2335c57724f0429f767993b0bafdecca7b504d51cb64dd96b1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ebebd585551c3487b633386de6c6383cb978a0fcea9a4569953c78e33014d22e\"" Feb 12 19:40:54.840968 env[1153]: time="2024-02-12T19:40:54.840936075Z" level=info msg="StartContainer for \"ebebd585551c3487b633386de6c6383cb978a0fcea9a4569953c78e33014d22e\"" Feb 12 19:40:54.868757 systemd[1]: Started cri-containerd-ebebd585551c3487b633386de6c6383cb978a0fcea9a4569953c78e33014d22e.scope. Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.901000 audit: BPF prog-id=135 op=LOAD Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2603 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:54.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562656264353835353531633334383762363333333836646536633633 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2603 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:54.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562656264353835353531633334383762363333333836646536633633 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.902000 audit: BPF prog-id=136 op=LOAD Feb 12 19:40:54.902000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2603 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:54.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562656264353835353531633334383762363333333836646536633633 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.903000 audit: BPF prog-id=137 op=LOAD Feb 12 19:40:54.903000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2603 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:54.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562656264353835353531633334383762363333333836646536633633 Feb 12 19:40:54.904000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:40:54.904000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:54.904000 audit: BPF prog-id=138 op=LOAD Feb 12 19:40:54.904000 audit[2721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2603 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:54.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562656264353835353531633334383762363333333836646536633633 Feb 12 19:40:54.956865 env[1153]: time="2024-02-12T19:40:54.956814967Z" level=info msg="StartContainer for \"ebebd585551c3487b633386de6c6383cb978a0fcea9a4569953c78e33014d22e\" returns successfully" Feb 12 19:40:55.830408 kubelet[2039]: E0212 19:40:55.830363 2039 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:40:55.885209 kubelet[2039]: E0212 19:40:55.885182 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:55.895413 kubelet[2039]: I0212 19:40:55.895373 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6c6855cc6c-c4pfk" podStartSLOduration=-9.223372032959444e+09 pod.CreationTimestamp="2024-02-12 19:40:52 +0000 UTC" firstStartedPulling="2024-02-12 19:40:52.803883313 +0000 UTC m=+19.137022489" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:55.894802011 +0000 UTC m=+22.227941227" watchObservedRunningTime="2024-02-12 19:40:55.89533093 +0000 UTC m=+22.228470146" Feb 12 19:40:55.899771 kubelet[2039]: E0212 19:40:55.899738 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.899771 kubelet[2039]: W0212 19:40:55.899760 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.899771 kubelet[2039]: E0212 19:40:55.899780 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.899981 kubelet[2039]: E0212 19:40:55.899968 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.899981 kubelet[2039]: W0212 19:40:55.899981 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.900037 kubelet[2039]: E0212 19:40:55.899994 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.900161 kubelet[2039]: E0212 19:40:55.900135 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.900161 kubelet[2039]: W0212 19:40:55.900147 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.900161 kubelet[2039]: E0212 19:40:55.900158 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.900700 kubelet[2039]: E0212 19:40:55.900666 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.900700 kubelet[2039]: W0212 19:40:55.900688 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.900700 kubelet[2039]: E0212 19:40:55.900702 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.900883 kubelet[2039]: E0212 19:40:55.900869 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.900883 kubelet[2039]: W0212 19:40:55.900881 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.900955 kubelet[2039]: E0212 19:40:55.900892 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.901028 kubelet[2039]: E0212 19:40:55.901018 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.901028 kubelet[2039]: W0212 19:40:55.901026 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.901078 kubelet[2039]: E0212 19:40:55.901036 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.901241 kubelet[2039]: E0212 19:40:55.901230 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.901272 kubelet[2039]: W0212 19:40:55.901241 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.901272 kubelet[2039]: E0212 19:40:55.901252 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.901444 kubelet[2039]: E0212 19:40:55.901376 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.901444 kubelet[2039]: W0212 19:40:55.901420 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.901444 kubelet[2039]: E0212 19:40:55.901431 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.901610 kubelet[2039]: E0212 19:40:55.901599 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.901610 kubelet[2039]: W0212 19:40:55.901610 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.901671 kubelet[2039]: E0212 19:40:55.901621 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.901798 kubelet[2039]: E0212 19:40:55.901786 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.901798 kubelet[2039]: W0212 19:40:55.901796 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.901849 kubelet[2039]: E0212 19:40:55.901807 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.901985 kubelet[2039]: E0212 19:40:55.901973 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.901985 kubelet[2039]: W0212 19:40:55.901984 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.902043 kubelet[2039]: E0212 19:40:55.901995 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.902150 kubelet[2039]: E0212 19:40:55.902137 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.902150 kubelet[2039]: W0212 19:40:55.902149 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.902205 kubelet[2039]: E0212 19:40:55.902159 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.931161 kubelet[2039]: E0212 19:40:55.931121 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.931161 kubelet[2039]: W0212 19:40:55.931153 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.931161 kubelet[2039]: E0212 19:40:55.931173 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.931440 kubelet[2039]: E0212 19:40:55.931425 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.931440 kubelet[2039]: W0212 19:40:55.931436 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.931523 kubelet[2039]: E0212 19:40:55.931453 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.931725 kubelet[2039]: E0212 19:40:55.931629 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.931725 kubelet[2039]: W0212 19:40:55.931640 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.931725 kubelet[2039]: E0212 19:40:55.931654 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.932182 kubelet[2039]: E0212 19:40:55.931896 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.932182 kubelet[2039]: W0212 19:40:55.931910 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.932182 kubelet[2039]: E0212 19:40:55.931934 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.932182 kubelet[2039]: E0212 19:40:55.932078 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.932182 kubelet[2039]: W0212 19:40:55.932086 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.932182 kubelet[2039]: E0212 19:40:55.932105 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.932546 kubelet[2039]: E0212 19:40:55.932414 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.932546 kubelet[2039]: W0212 19:40:55.932426 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.932546 kubelet[2039]: E0212 19:40:55.932443 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.932803 kubelet[2039]: E0212 19:40:55.932720 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.932803 kubelet[2039]: W0212 19:40:55.932731 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.932803 kubelet[2039]: E0212 19:40:55.932783 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.933043 kubelet[2039]: E0212 19:40:55.932962 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.933043 kubelet[2039]: W0212 19:40:55.932973 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.933043 kubelet[2039]: E0212 19:40:55.933009 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.933279 kubelet[2039]: E0212 19:40:55.933201 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.933279 kubelet[2039]: W0212 19:40:55.933212 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.933279 kubelet[2039]: E0212 19:40:55.933241 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.933514 kubelet[2039]: E0212 19:40:55.933447 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.933514 kubelet[2039]: W0212 19:40:55.933459 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.933514 kubelet[2039]: E0212 19:40:55.933477 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.933665 kubelet[2039]: E0212 19:40:55.933650 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.933665 kubelet[2039]: W0212 19:40:55.933663 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.933725 kubelet[2039]: E0212 19:40:55.933680 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.936728 kubelet[2039]: E0212 19:40:55.936560 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.936728 kubelet[2039]: W0212 19:40:55.936577 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.936728 kubelet[2039]: E0212 19:40:55.936608 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.937165 kubelet[2039]: E0212 19:40:55.936902 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.937165 kubelet[2039]: W0212 19:40:55.936914 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.937165 kubelet[2039]: E0212 19:40:55.936949 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.937165 kubelet[2039]: E0212 19:40:55.937078 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.937165 kubelet[2039]: W0212 19:40:55.937086 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.937165 kubelet[2039]: E0212 19:40:55.937098 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.937608 kubelet[2039]: E0212 19:40:55.937407 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.937608 kubelet[2039]: W0212 19:40:55.937421 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.937608 kubelet[2039]: E0212 19:40:55.937438 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.937983 kubelet[2039]: E0212 19:40:55.937767 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.937983 kubelet[2039]: W0212 19:40:55.937781 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.937983 kubelet[2039]: E0212 19:40:55.937794 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.938268 kubelet[2039]: E0212 19:40:55.938161 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.938268 kubelet[2039]: W0212 19:40:55.938173 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.938268 kubelet[2039]: E0212 19:40:55.938189 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:55.938472 kubelet[2039]: E0212 19:40:55.938431 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:55.938472 kubelet[2039]: W0212 19:40:55.938442 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:55.938472 kubelet[2039]: E0212 19:40:55.938453 2039 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:56.224776 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3803258811.mount: Deactivated successfully. Feb 12 19:40:56.320227 env[1153]: time="2024-02-12T19:40:56.320152254Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:56.321804 env[1153]: time="2024-02-12T19:40:56.321765011Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:56.323043 env[1153]: time="2024-02-12T19:40:56.322995648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:56.324371 env[1153]: time="2024-02-12T19:40:56.324338806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:56.324881 env[1153]: time="2024-02-12T19:40:56.324853205Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:40:56.329664 env[1153]: time="2024-02-12T19:40:56.328210278Z" level=info msg="CreateContainer within sandbox \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:40:56.339812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3275734577.mount: Deactivated successfully. Feb 12 19:40:56.350676 env[1153]: time="2024-02-12T19:40:56.350610432Z" level=info msg="CreateContainer within sandbox \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7\"" Feb 12 19:40:56.351256 env[1153]: time="2024-02-12T19:40:56.351226111Z" level=info msg="StartContainer for \"2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7\"" Feb 12 19:40:56.369393 systemd[1]: Started cri-containerd-2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7.scope. Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2649 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:56.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262326332343762396638343538323330653634396466303333303830 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.406000 audit: BPF prog-id=139 op=LOAD Feb 12 19:40:56.406000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2649 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:56.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262326332343762396638343538323330653634396466303333303830 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.407000 audit: BPF prog-id=140 op=LOAD Feb 12 19:40:56.407000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2649 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:56.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262326332343762396638343538323330653634396466303333303830 Feb 12 19:40:56.407000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:40:56.407000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:56.408000 audit: BPF prog-id=141 op=LOAD Feb 12 19:40:56.408000 audit[2792]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2649 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:56.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262326332343762396638343538323330653634396466303333303830 Feb 12 19:40:56.424951 env[1153]: time="2024-02-12T19:40:56.424892162Z" level=info msg="StartContainer for \"2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7\" returns successfully" Feb 12 19:40:56.432476 systemd[1]: cri-containerd-2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7.scope: Deactivated successfully. Feb 12 19:40:56.436000 audit: BPF prog-id=141 op=UNLOAD Feb 12 19:40:56.473690 env[1153]: time="2024-02-12T19:40:56.473640063Z" level=info msg="shim disconnected" id=2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7 Feb 12 19:40:56.473690 env[1153]: time="2024-02-12T19:40:56.473688023Z" level=warning msg="cleaning up after shim disconnected" id=2b2c247b9f8458230e649df033080db3b5c87178c56feac4c2b2af288fa920c7 namespace=k8s.io Feb 12 19:40:56.473690 env[1153]: time="2024-02-12T19:40:56.473697183Z" level=info msg="cleaning up dead shim" Feb 12 19:40:56.480717 env[1153]: time="2024-02-12T19:40:56.480614089Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:40:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2831 runtime=io.containerd.runc.v2\n" Feb 12 19:40:56.888334 kubelet[2039]: I0212 19:40:56.887834 2039 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:40:56.888334 kubelet[2039]: E0212 19:40:56.888130 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:56.888847 env[1153]: time="2024-02-12T19:40:56.888804821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:40:56.888901 kubelet[2039]: E0212 19:40:56.888836 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:40:57.830528 kubelet[2039]: E0212 19:40:57.830481 2039 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:40:57.982939 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2949515284.mount: Deactivated successfully. Feb 12 19:40:59.830386 kubelet[2039]: E0212 19:40:59.830350 2039 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:41:00.242477 env[1153]: time="2024-02-12T19:41:00.242416098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:00.243533 env[1153]: time="2024-02-12T19:41:00.243488457Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:00.244964 env[1153]: time="2024-02-12T19:41:00.244930174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:00.246084 env[1153]: time="2024-02-12T19:41:00.246059573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:00.247235 env[1153]: time="2024-02-12T19:41:00.247200931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:41:00.250225 env[1153]: time="2024-02-12T19:41:00.250191166Z" level=info msg="CreateContainer within sandbox \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:41:00.260432 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3817110554.mount: Deactivated successfully. Feb 12 19:41:00.263289 env[1153]: time="2024-02-12T19:41:00.263251266Z" level=info msg="CreateContainer within sandbox \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a\"" Feb 12 19:41:00.263970 env[1153]: time="2024-02-12T19:41:00.263946945Z" level=info msg="StartContainer for \"aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a\"" Feb 12 19:41:00.287807 systemd[1]: Started cri-containerd-aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a.scope. Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332562 kernel: kauditd_printk_skb: 154 callbacks suppressed Feb 12 19:41:00.332629 kernel: audit: type=1400 audit(1707766860.331:1145): avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2649 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.336990 kernel: audit: type=1300 audit(1707766860.331:1145): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2649 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.337041 kernel: audit: type=1327 audit(1707766860.331:1145): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656633613333366465323131306361343233613262373165643361 Feb 12 19:41:00.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656633613333366465323131306361343233613262373165643361 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.341222 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.341300 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.344896 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.344979 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.348786 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.348877 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.354517 kernel: audit: type=1400 audit(1707766860.331:1146): avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.331000 audit: BPF prog-id=142 op=LOAD Feb 12 19:41:00.331000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2649 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656633613333366465323131306361343233613262373165643361 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.332000 audit: BPF prog-id=143 op=LOAD Feb 12 19:41:00.332000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2649 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656633613333366465323131306361343233613262373165643361 Feb 12 19:41:00.333000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:41:00.333000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.333000 audit: BPF prog-id=144 op=LOAD Feb 12 19:41:00.333000 audit[2858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2649 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656633613333366465323131306361343233613262373165643361 Feb 12 19:41:00.403613 env[1153]: time="2024-02-12T19:41:00.403570286Z" level=info msg="StartContainer for \"aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a\" returns successfully" Feb 12 19:41:00.896544 kubelet[2039]: E0212 19:41:00.896241 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:01.017986 env[1153]: time="2024-02-12T19:41:01.017914325Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:41:01.019832 systemd[1]: cri-containerd-aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a.scope: Deactivated successfully. Feb 12 19:41:01.023000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:41:01.036492 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a-rootfs.mount: Deactivated successfully. Feb 12 19:41:01.054772 env[1153]: time="2024-02-12T19:41:01.054727911Z" level=info msg="shim disconnected" id=aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a Feb 12 19:41:01.054772 env[1153]: time="2024-02-12T19:41:01.054773471Z" level=warning msg="cleaning up after shim disconnected" id=aaef3a336de2110ca423a2b71ed3a4de79710c49ed53cb1c6fea1618193c3b6a namespace=k8s.io Feb 12 19:41:01.055040 env[1153]: time="2024-02-12T19:41:01.054782951Z" level=info msg="cleaning up dead shim" Feb 12 19:41:01.061481 env[1153]: time="2024-02-12T19:41:01.061442901Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:41:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2906 runtime=io.containerd.runc.v2\n" Feb 12 19:41:01.117784 kubelet[2039]: I0212 19:41:01.117303 2039 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:41:01.141804 kubelet[2039]: I0212 19:41:01.140368 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:41:01.141804 kubelet[2039]: I0212 19:41:01.141406 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:41:01.144350 kubelet[2039]: I0212 19:41:01.144021 2039 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:41:01.152472 systemd[1]: Created slice kubepods-besteffort-pod2ed2d7d4_a83b_4b06_9d41_036b09ea700c.slice. Feb 12 19:41:01.162923 systemd[1]: Created slice kubepods-burstable-pod6d639f2a_4069_400b_8214_b7e86392dee6.slice. Feb 12 19:41:01.168821 systemd[1]: Created slice kubepods-burstable-pod63bb7fde_eb42_4081_bbdf_4ab7af48beae.slice. Feb 12 19:41:01.174684 kubelet[2039]: I0212 19:41:01.174648 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ed2d7d4-a83b-4b06-9d41-036b09ea700c-tigera-ca-bundle\") pod \"calico-kube-controllers-85b9d877c4-cl8lx\" (UID: \"2ed2d7d4-a83b-4b06-9d41-036b09ea700c\") " pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" Feb 12 19:41:01.174811 kubelet[2039]: I0212 19:41:01.174705 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6d639f2a-4069-400b-8214-b7e86392dee6-config-volume\") pod \"coredns-787d4945fb-gfkrt\" (UID: \"6d639f2a-4069-400b-8214-b7e86392dee6\") " pod="kube-system/coredns-787d4945fb-gfkrt" Feb 12 19:41:01.174811 kubelet[2039]: I0212 19:41:01.174731 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f8vmv\" (UniqueName: \"kubernetes.io/projected/63bb7fde-eb42-4081-bbdf-4ab7af48beae-kube-api-access-f8vmv\") pod \"coredns-787d4945fb-m5s2b\" (UID: \"63bb7fde-eb42-4081-bbdf-4ab7af48beae\") " pod="kube-system/coredns-787d4945fb-m5s2b" Feb 12 19:41:01.174811 kubelet[2039]: I0212 19:41:01.174758 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjqhb\" (UniqueName: \"kubernetes.io/projected/2ed2d7d4-a83b-4b06-9d41-036b09ea700c-kube-api-access-wjqhb\") pod \"calico-kube-controllers-85b9d877c4-cl8lx\" (UID: \"2ed2d7d4-a83b-4b06-9d41-036b09ea700c\") " pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" Feb 12 19:41:01.174811 kubelet[2039]: I0212 19:41:01.174782 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-88tfh\" (UniqueName: \"kubernetes.io/projected/6d639f2a-4069-400b-8214-b7e86392dee6-kube-api-access-88tfh\") pod \"coredns-787d4945fb-gfkrt\" (UID: \"6d639f2a-4069-400b-8214-b7e86392dee6\") " pod="kube-system/coredns-787d4945fb-gfkrt" Feb 12 19:41:01.174811 kubelet[2039]: I0212 19:41:01.174801 2039 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/63bb7fde-eb42-4081-bbdf-4ab7af48beae-config-volume\") pod \"coredns-787d4945fb-m5s2b\" (UID: \"63bb7fde-eb42-4081-bbdf-4ab7af48beae\") " pod="kube-system/coredns-787d4945fb-m5s2b" Feb 12 19:41:01.460619 env[1153]: time="2024-02-12T19:41:01.460465995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85b9d877c4-cl8lx,Uid:2ed2d7d4-a83b-4b06-9d41-036b09ea700c,Namespace:calico-system,Attempt:0,}" Feb 12 19:41:01.464748 kubelet[2039]: E0212 19:41:01.464710 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:01.465334 env[1153]: time="2024-02-12T19:41:01.465277708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-gfkrt,Uid:6d639f2a-4069-400b-8214-b7e86392dee6,Namespace:kube-system,Attempt:0,}" Feb 12 19:41:01.474916 kubelet[2039]: E0212 19:41:01.471363 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:01.475491 env[1153]: time="2024-02-12T19:41:01.475452733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m5s2b,Uid:63bb7fde-eb42-4081-bbdf-4ab7af48beae,Namespace:kube-system,Attempt:0,}" Feb 12 19:41:01.574962 env[1153]: time="2024-02-12T19:41:01.574894187Z" level=error msg="Failed to destroy network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.575518 env[1153]: time="2024-02-12T19:41:01.575468466Z" level=error msg="encountered an error cleaning up failed sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.575664 env[1153]: time="2024-02-12T19:41:01.575634826Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85b9d877c4-cl8lx,Uid:2ed2d7d4-a83b-4b06-9d41-036b09ea700c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.576520 kubelet[2039]: E0212 19:41:01.576484 2039 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.576625 kubelet[2039]: E0212 19:41:01.576556 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" Feb 12 19:41:01.576625 kubelet[2039]: E0212 19:41:01.576581 2039 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" Feb 12 19:41:01.576703 env[1153]: time="2024-02-12T19:41:01.576564784Z" level=error msg="Failed to destroy network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.576733 kubelet[2039]: E0212 19:41:01.576634 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85b9d877c4-cl8lx_calico-system(2ed2d7d4-a83b-4b06-9d41-036b09ea700c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85b9d877c4-cl8lx_calico-system(2ed2d7d4-a83b-4b06-9d41-036b09ea700c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" podUID=2ed2d7d4-a83b-4b06-9d41-036b09ea700c Feb 12 19:41:01.576909 env[1153]: time="2024-02-12T19:41:01.576849984Z" level=error msg="encountered an error cleaning up failed sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.576960 env[1153]: time="2024-02-12T19:41:01.576900464Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m5s2b,Uid:63bb7fde-eb42-4081-bbdf-4ab7af48beae,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.577056 kubelet[2039]: E0212 19:41:01.577030 2039 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.577120 kubelet[2039]: E0212 19:41:01.577070 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-m5s2b" Feb 12 19:41:01.577120 kubelet[2039]: E0212 19:41:01.577094 2039 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-m5s2b" Feb 12 19:41:01.577176 kubelet[2039]: E0212 19:41:01.577131 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-m5s2b_kube-system(63bb7fde-eb42-4081-bbdf-4ab7af48beae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-m5s2b_kube-system(63bb7fde-eb42-4081-bbdf-4ab7af48beae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-m5s2b" podUID=63bb7fde-eb42-4081-bbdf-4ab7af48beae Feb 12 19:41:01.581137 env[1153]: time="2024-02-12T19:41:01.581101258Z" level=error msg="Failed to destroy network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.581449 env[1153]: time="2024-02-12T19:41:01.581378297Z" level=error msg="encountered an error cleaning up failed sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.581449 env[1153]: time="2024-02-12T19:41:01.581421657Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-gfkrt,Uid:6d639f2a-4069-400b-8214-b7e86392dee6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.581596 kubelet[2039]: E0212 19:41:01.581579 2039 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.581680 kubelet[2039]: E0212 19:41:01.581613 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-gfkrt" Feb 12 19:41:01.581680 kubelet[2039]: E0212 19:41:01.581631 2039 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-gfkrt" Feb 12 19:41:01.581680 kubelet[2039]: E0212 19:41:01.581672 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-gfkrt_kube-system(6d639f2a-4069-400b-8214-b7e86392dee6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-gfkrt_kube-system(6d639f2a-4069-400b-8214-b7e86392dee6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-gfkrt" podUID=6d639f2a-4069-400b-8214-b7e86392dee6 Feb 12 19:41:01.835869 systemd[1]: Created slice kubepods-besteffort-podd948f890_19cf_423e_b6f0_7d2d5941a3ee.slice. Feb 12 19:41:01.838307 env[1153]: time="2024-02-12T19:41:01.838254560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qpv5w,Uid:d948f890-19cf-423e-b6f0-7d2d5941a3ee,Namespace:calico-system,Attempt:0,}" Feb 12 19:41:01.887691 env[1153]: time="2024-02-12T19:41:01.887624047Z" level=error msg="Failed to destroy network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.888017 env[1153]: time="2024-02-12T19:41:01.887972367Z" level=error msg="encountered an error cleaning up failed sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.888059 env[1153]: time="2024-02-12T19:41:01.888035367Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qpv5w,Uid:d948f890-19cf-423e-b6f0-7d2d5941a3ee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.888308 kubelet[2039]: E0212 19:41:01.888274 2039 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.888367 kubelet[2039]: E0212 19:41:01.888328 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:41:01.888367 kubelet[2039]: E0212 19:41:01.888349 2039 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qpv5w" Feb 12 19:41:01.888420 kubelet[2039]: E0212 19:41:01.888402 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qpv5w_calico-system(d948f890-19cf-423e-b6f0-7d2d5941a3ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qpv5w_calico-system(d948f890-19cf-423e-b6f0-7d2d5941a3ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:41:01.899717 kubelet[2039]: E0212 19:41:01.899595 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:01.900616 env[1153]: time="2024-02-12T19:41:01.900577988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:41:01.906528 kubelet[2039]: I0212 19:41:01.901285 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:01.906528 kubelet[2039]: I0212 19:41:01.902931 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:01.906528 kubelet[2039]: I0212 19:41:01.904175 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:01.906725 env[1153]: time="2024-02-12T19:41:01.903174264Z" level=info msg="StopPodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\"" Feb 12 19:41:01.906725 env[1153]: time="2024-02-12T19:41:01.904821102Z" level=info msg="StopPodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\"" Feb 12 19:41:01.908727 env[1153]: time="2024-02-12T19:41:01.908652976Z" level=info msg="StopPodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\"" Feb 12 19:41:01.917148 kubelet[2039]: I0212 19:41:01.917112 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:01.918790 env[1153]: time="2024-02-12T19:41:01.918750881Z" level=info msg="StopPodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\"" Feb 12 19:41:01.942490 env[1153]: time="2024-02-12T19:41:01.942434367Z" level=error msg="StopPodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" failed" error="failed to destroy network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.943123 kubelet[2039]: E0212 19:41:01.942959 2039 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:01.943123 kubelet[2039]: E0212 19:41:01.943024 2039 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3} Feb 12 19:41:01.943123 kubelet[2039]: E0212 19:41:01.943057 2039 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"63bb7fde-eb42-4081-bbdf-4ab7af48beae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:41:01.943123 kubelet[2039]: E0212 19:41:01.943094 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"63bb7fde-eb42-4081-bbdf-4ab7af48beae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-m5s2b" podUID=63bb7fde-eb42-4081-bbdf-4ab7af48beae Feb 12 19:41:01.945239 env[1153]: time="2024-02-12T19:41:01.945193883Z" level=error msg="StopPodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" failed" error="failed to destroy network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.945422 kubelet[2039]: E0212 19:41:01.945397 2039 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:01.945491 kubelet[2039]: E0212 19:41:01.945433 2039 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90} Feb 12 19:41:01.945546 kubelet[2039]: E0212 19:41:01.945512 2039 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2ed2d7d4-a83b-4b06-9d41-036b09ea700c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:41:01.945546 kubelet[2039]: E0212 19:41:01.945544 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2ed2d7d4-a83b-4b06-9d41-036b09ea700c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" podUID=2ed2d7d4-a83b-4b06-9d41-036b09ea700c Feb 12 19:41:01.947875 env[1153]: time="2024-02-12T19:41:01.947831999Z" level=error msg="StopPodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" failed" error="failed to destroy network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.948156 kubelet[2039]: E0212 19:41:01.948133 2039 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:01.948238 kubelet[2039]: E0212 19:41:01.948161 2039 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24} Feb 12 19:41:01.948238 kubelet[2039]: E0212 19:41:01.948190 2039 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6d639f2a-4069-400b-8214-b7e86392dee6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:41:01.948238 kubelet[2039]: E0212 19:41:01.948221 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6d639f2a-4069-400b-8214-b7e86392dee6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-gfkrt" podUID=6d639f2a-4069-400b-8214-b7e86392dee6 Feb 12 19:41:01.954043 env[1153]: time="2024-02-12T19:41:01.954003670Z" level=error msg="StopPodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" failed" error="failed to destroy network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:01.954210 kubelet[2039]: E0212 19:41:01.954194 2039 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:01.954269 kubelet[2039]: E0212 19:41:01.954222 2039 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015} Feb 12 19:41:01.954269 kubelet[2039]: E0212 19:41:01.954251 2039 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:41:01.954338 kubelet[2039]: E0212 19:41:01.954276 2039 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d948f890-19cf-423e-b6f0-7d2d5941a3ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qpv5w" podUID=d948f890-19cf-423e-b6f0-7d2d5941a3ee Feb 12 19:41:02.289723 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90-shm.mount: Deactivated successfully. Feb 12 19:41:06.458977 kubelet[2039]: I0212 19:41:06.458924 2039 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:41:06.459654 kubelet[2039]: E0212 19:41:06.459624 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:06.524000 audit[3192]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=3192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:06.526520 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:41:06.526602 kernel: audit: type=1325 audit(1707766866.524:1152): table=filter:111 family=2 entries=13 op=nft_register_rule pid=3192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:06.526630 kernel: audit: type=1300 audit(1707766866.524:1152): arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffffe190c40 a2=0 a3=ffff93c846c0 items=0 ppid=2256 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.524000 audit[3192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffffe190c40 a2=0 a3=ffff93c846c0 items=0 ppid=2256 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.529158 kernel: audit: type=1327 audit(1707766866.524:1152): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:06.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:06.525000 audit[3192]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:06.525000 audit[3192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=fffffe190c40 a2=0 a3=ffff93c846c0 items=0 ppid=2256 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.543875 kernel: audit: type=1325 audit(1707766866.525:1153): table=nat:112 family=2 entries=27 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:06.543921 kernel: audit: type=1300 audit(1707766866.525:1153): arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=fffffe190c40 a2=0 a3=ffff93c846c0 items=0 ppid=2256 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.543941 kernel: audit: type=1327 audit(1707766866.525:1153): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:06.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:06.927009 kubelet[2039]: E0212 19:41:06.926982 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:07.066615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3230504566.mount: Deactivated successfully. Feb 12 19:41:07.448840 env[1153]: time="2024-02-12T19:41:07.448791316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:07.450370 env[1153]: time="2024-02-12T19:41:07.450337995Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:07.451546 env[1153]: time="2024-02-12T19:41:07.451525114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:07.452617 env[1153]: time="2024-02-12T19:41:07.452589752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:07.453001 env[1153]: time="2024-02-12T19:41:07.452965792Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:41:07.467276 env[1153]: time="2024-02-12T19:41:07.467227138Z" level=info msg="CreateContainer within sandbox \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:41:07.481592 env[1153]: time="2024-02-12T19:41:07.481547844Z" level=info msg="CreateContainer within sandbox \"37bb6a99ec250f9b9845bebbe47f34f9207d7330e0ad2554d1629fcb2f726b99\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"099b3a34fc89362f074dfbc012a2f8a55b7a30097d7b52a8d4d8f2a100219263\"" Feb 12 19:41:07.483218 env[1153]: time="2024-02-12T19:41:07.482066443Z" level=info msg="StartContainer for \"099b3a34fc89362f074dfbc012a2f8a55b7a30097d7b52a8d4d8f2a100219263\"" Feb 12 19:41:07.507248 systemd[1]: Started cri-containerd-099b3a34fc89362f074dfbc012a2f8a55b7a30097d7b52a8d4d8f2a100219263.scope. Feb 12 19:41:07.555000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.555000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2649 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.559979 kernel: audit: type=1400 audit(1707766867.555:1154): avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.560034 kernel: audit: type=1300 audit(1707766867.555:1154): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2649 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.560065 kernel: audit: type=1327 audit(1707766867.555:1154): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396233613334666338393336326630373464666263303132613266 Feb 12 19:41:07.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396233613334666338393336326630373464666263303132613266 Feb 12 19:41:07.562337 kernel: audit: type=1400 audit(1707766867.557:1155): avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.557000 audit: BPF prog-id=145 op=LOAD Feb 12 19:41:07.557000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2649 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396233613334666338393336326630373464666263303132613266 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.559000 audit: BPF prog-id=146 op=LOAD Feb 12 19:41:07.559000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2649 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396233613334666338393336326630373464666263303132613266 Feb 12 19:41:07.561000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:41:07.561000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.561000 audit: BPF prog-id=147 op=LOAD Feb 12 19:41:07.561000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2649 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039396233613334666338393336326630373464666263303132613266 Feb 12 19:41:07.586479 env[1153]: time="2024-02-12T19:41:07.586434179Z" level=info msg="StartContainer for \"099b3a34fc89362f074dfbc012a2f8a55b7a30097d7b52a8d4d8f2a100219263\" returns successfully" Feb 12 19:41:07.703609 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:41:07.703717 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:41:07.930155 kubelet[2039]: E0212 19:41:07.930114 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:08.931535 kubelet[2039]: I0212 19:41:08.931486 2039 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:41:08.932243 kubelet[2039]: E0212 19:41:08.932229 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:09.021000 audit[3318]: AVC avc: denied { write } for pid=3318 comm="tee" name="fd" dev="proc" ino=20027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.021000 audit[3318]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1e2c980 a2=241 a3=1b6 items=1 ppid=3272 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.021000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:41:09.021000 audit: PATH item=0 name="/dev/fd/63" inode=18951 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.027000 audit[3332]: AVC avc: denied { write } for pid=3332 comm="tee" name="fd" dev="proc" ino=20031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.027000 audit[3332]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff38b197f a2=241 a3=1b6 items=1 ppid=3280 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.027000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:41:09.027000 audit: PATH item=0 name="/dev/fd/63" inode=18958 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.028000 audit[3322]: AVC avc: denied { write } for pid=3322 comm="tee" name="fd" dev="proc" ino=20035 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.028000 audit[3322]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd065b98f a2=241 a3=1b6 items=1 ppid=3271 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.028000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:41:09.028000 audit: PATH item=0 name="/dev/fd/63" inode=17378 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.029000 audit[3338]: AVC avc: denied { write } for pid=3338 comm="tee" name="fd" dev="proc" ino=18963 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.029000 audit[3338]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef5e2990 a2=241 a3=1b6 items=1 ppid=3284 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.029000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:41:09.029000 audit: PATH item=0 name="/dev/fd/63" inode=20499 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.029000 audit[3335]: AVC avc: denied { write } for pid=3335 comm="tee" name="fd" dev="proc" ino=20039 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.029000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.029000 audit[3335]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda486991 a2=241 a3=1b6 items=1 ppid=3275 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.029000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:41:09.029000 audit: PATH item=0 name="/dev/fd/63" inode=20024 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.029000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.039000 audit[3325]: AVC avc: denied { write } for pid=3325 comm="tee" name="fd" dev="proc" ino=17389 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.039000 audit[3325]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeb0a898f a2=241 a3=1b6 items=1 ppid=3279 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.039000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:41:09.039000 audit: PATH item=0 name="/dev/fd/63" inode=20494 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.039000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.052000 audit[3348]: AVC avc: denied { write } for pid=3348 comm="tee" name="fd" dev="proc" ino=20043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.052000 audit[3348]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef66198f a2=241 a3=1b6 items=1 ppid=3281 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.052000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:41:09.052000 audit: PATH item=0 name="/dev/fd/63" inode=18965 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.052000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit: BPF prog-id=148 op=LOAD Feb 12 19:41:09.282000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0cf61a8 a2=70 a3=0 items=0 ppid=3276 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.282000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:09.282000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit: BPF prog-id=149 op=LOAD Feb 12 19:41:09.282000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0cf61a8 a2=70 a3=4a174c items=0 ppid=3276 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.282000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:09.282000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:41:09.282000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.282000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd0cf61d8 a2=70 a3=2658c79f items=0 ppid=3276 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.282000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.283000 audit: BPF prog-id=150 op=LOAD Feb 12 19:41:09.283000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd0cf6128 a2=70 a3=2658c7b9 items=0 ppid=3276 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.283000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:09.289000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.289000 audit[3420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca1c54e8 a2=70 a3=0 items=0 ppid=3276 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.289000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:41:09.289000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.289000 audit[3420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca1c53c8 a2=70 a3=2 items=0 ppid=3276 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.289000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:41:09.295000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:41:09.333000 audit[3446]: NETFILTER_CFG table=mangle:113 family=2 entries=19 op=nft_register_chain pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:09.333000 audit[3446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc19c5280 a2=0 a3=ffff890a7fa8 items=0 ppid=3276 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:09.338000 audit[3447]: NETFILTER_CFG table=raw:114 family=2 entries=19 op=nft_register_chain pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:09.338000 audit[3447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc3e51860 a2=0 a3=ffffb245cfa8 items=0 ppid=3276 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:09.343000 audit[3452]: NETFILTER_CFG table=nat:115 family=2 entries=16 op=nft_register_chain pid=3452 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:09.343000 audit[3452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc4124110 a2=0 a3=ffff94802fa8 items=0 ppid=3276 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:09.345000 audit[3451]: NETFILTER_CFG table=filter:116 family=2 entries=39 op=nft_register_chain pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:09.345000 audit[3451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffdb471c80 a2=0 a3=ffffaecdafa8 items=0 ppid=3276 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:10.184783 systemd-networkd[1051]: vxlan.calico: Link UP Feb 12 19:41:10.184796 systemd-networkd[1051]: vxlan.calico: Gained carrier Feb 12 19:41:12.233617 systemd-networkd[1051]: vxlan.calico: Gained IPv6LL Feb 12 19:41:12.831656 env[1153]: time="2024-02-12T19:41:12.831595761Z" level=info msg="StopPodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\"" Feb 12 19:41:12.902846 kubelet[2039]: I0212 19:41:12.902805 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-ktqc9" podStartSLOduration=-9.223372015952007e+09 pod.CreationTimestamp="2024-02-12 19:40:52 +0000 UTC" firstStartedPulling="2024-02-12 19:40:53.10860293 +0000 UTC m=+19.441742146" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:07.945546821 +0000 UTC m=+34.278686037" watchObservedRunningTime="2024-02-12 19:41:12.90276787 +0000 UTC m=+39.235907086" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:12.903 [INFO][3480] k8s.go 578: Cleaning up netns ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:12.903 [INFO][3480] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" iface="eth0" netns="/var/run/netns/cni-c290c0f4-cee3-06c4-478d-c4c6742fbbfb" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:12.906 [INFO][3480] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" iface="eth0" netns="/var/run/netns/cni-c290c0f4-cee3-06c4-478d-c4c6742fbbfb" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:12.906 [INFO][3480] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" iface="eth0" netns="/var/run/netns/cni-c290c0f4-cee3-06c4-478d-c4c6742fbbfb" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:12.906 [INFO][3480] k8s.go 585: Releasing IP address(es) ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:12.908 [INFO][3480] utils.go 188: Calico CNI releasing IP address ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.017 [INFO][3487] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.017 [INFO][3487] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.017 [INFO][3487] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.028 [WARNING][3487] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.028 [INFO][3487] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.029 [INFO][3487] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:13.032288 env[1153]: 2024-02-12 19:41:13.031 [INFO][3480] k8s.go 591: Teardown processing complete. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:13.032769 env[1153]: time="2024-02-12T19:41:13.032414458Z" level=info msg="TearDown network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" successfully" Feb 12 19:41:13.032769 env[1153]: time="2024-02-12T19:41:13.032446058Z" level=info msg="StopPodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" returns successfully" Feb 12 19:41:13.033989 systemd[1]: run-netns-cni\x2dc290c0f4\x2dcee3\x2d06c4\x2d478d\x2dc4c6742fbbfb.mount: Deactivated successfully. Feb 12 19:41:13.035166 kubelet[2039]: E0212 19:41:13.035147 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:13.035561 env[1153]: time="2024-02-12T19:41:13.035482976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m5s2b,Uid:63bb7fde-eb42-4081-bbdf-4ab7af48beae,Namespace:kube-system,Attempt:1,}" Feb 12 19:41:13.159693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:13.159828 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4e1563fd68b: link becomes ready Feb 12 19:41:13.158228 systemd-networkd[1051]: cali4e1563fd68b: Link UP Feb 12 19:41:13.159730 systemd-networkd[1051]: cali4e1563fd68b: Gained carrier Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.080 [INFO][3495] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--787d4945fb--m5s2b-eth0 coredns-787d4945fb- kube-system 63bb7fde-eb42-4081-bbdf-4ab7af48beae 701 0 2024-02-12 19:40:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-787d4945fb-m5s2b eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4e1563fd68b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.080 [INFO][3495] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.105 [INFO][3510] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" HandleID="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.118 [INFO][3510] ipam_plugin.go 268: Auto assigning IP ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" HandleID="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029dab0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-787d4945fb-m5s2b", "timestamp":"2024-02-12 19:41:13.105270128 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.118 [INFO][3510] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.118 [INFO][3510] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.118 [INFO][3510] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.121 [INFO][3510] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.134 [INFO][3510] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.138 [INFO][3510] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.140 [INFO][3510] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.143 [INFO][3510] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.143 [INFO][3510] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.144 [INFO][3510] ipam.go 1682: Creating new handle: k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84 Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.147 [INFO][3510] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.151 [INFO][3510] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.151 [INFO][3510] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" host="localhost" Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.151 [INFO][3510] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:13.178396 env[1153]: 2024-02-12 19:41:13.151 [INFO][3510] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" HandleID="k8s-pod-network.2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.179106 env[1153]: 2024-02-12 19:41:13.154 [INFO][3495] k8s.go 385: Populated endpoint ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--m5s2b-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"63bb7fde-eb42-4081-bbdf-4ab7af48beae", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-787d4945fb-m5s2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e1563fd68b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:13.179106 env[1153]: 2024-02-12 19:41:13.154 [INFO][3495] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.179106 env[1153]: 2024-02-12 19:41:13.154 [INFO][3495] dataplane_linux.go 68: Setting the host side veth name to cali4e1563fd68b ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.179106 env[1153]: 2024-02-12 19:41:13.160 [INFO][3495] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.179106 env[1153]: 2024-02-12 19:41:13.164 [INFO][3495] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--m5s2b-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"63bb7fde-eb42-4081-bbdf-4ab7af48beae", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84", Pod:"coredns-787d4945fb-m5s2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e1563fd68b", MAC:"1a:ac:4c:17:30:c4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:13.179106 env[1153]: 2024-02-12 19:41:13.174 [INFO][3495] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84" Namespace="kube-system" Pod="coredns-787d4945fb-m5s2b" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:13.188000 audit[3535]: NETFILTER_CFG table=filter:117 family=2 entries=36 op=nft_register_chain pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:13.190756 env[1153]: time="2024-02-12T19:41:13.190666351Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:13.190756 env[1153]: time="2024-02-12T19:41:13.190713511Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:13.190756 env[1153]: time="2024-02-12T19:41:13.190723191Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:13.191032 env[1153]: time="2024-02-12T19:41:13.190989470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84 pid=3543 runtime=io.containerd.runc.v2 Feb 12 19:41:13.191446 kernel: kauditd_printk_skb: 135 callbacks suppressed Feb 12 19:41:13.191612 kernel: audit: type=1325 audit(1707766873.188:1180): table=filter:117 family=2 entries=36 op=nft_register_chain pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:13.188000 audit[3535]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff605cc90 a2=0 a3=ffffbbc0dfa8 items=0 ppid=3276 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.188000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:13.196042 kernel: audit: type=1300 audit(1707766873.188:1180): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff605cc90 a2=0 a3=ffffbbc0dfa8 items=0 ppid=3276 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.196103 kernel: audit: type=1327 audit(1707766873.188:1180): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:13.210874 systemd[1]: Started cri-containerd-2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84.scope. Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.231228 kernel: audit: type=1400 audit(1707766873.227:1181): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.231291 kernel: audit: type=1400 audit(1707766873.227:1182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.231312 kernel: audit: type=1400 audit(1707766873.227:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.234766 kernel: audit: type=1400 audit(1707766873.227:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.234828 kernel: audit: type=1400 audit(1707766873.227:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.236569 kernel: audit: type=1400 audit(1707766873.227:1186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.236721 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.240143 kernel: audit: type=1400 audit(1707766873.227:1187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.228000 audit: BPF prog-id=151 op=LOAD Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3543 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393966326561386530366338353063326339376332623336303433 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3543 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393966326561386530366338353063326339376332623336303433 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.229000 audit: BPF prog-id=152 op=LOAD Feb 12 19:41:13.229000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3543 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393966326561386530366338353063326339376332623336303433 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.230000 audit: BPF prog-id=153 op=LOAD Feb 12 19:41:13.230000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3543 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393966326561386530366338353063326339376332623336303433 Feb 12 19:41:13.232000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:41:13.232000 audit: BPF prog-id=152 op=UNLOAD Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.232000 audit: BPF prog-id=154 op=LOAD Feb 12 19:41:13.232000 audit[3554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3543 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393966326561386530366338353063326339376332623336303433 Feb 12 19:41:13.256239 env[1153]: time="2024-02-12T19:41:13.256191546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-m5s2b,Uid:63bb7fde-eb42-4081-bbdf-4ab7af48beae,Namespace:kube-system,Attempt:1,} returns sandbox id \"2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84\"" Feb 12 19:41:13.257378 kubelet[2039]: E0212 19:41:13.257185 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:13.259552 env[1153]: time="2024-02-12T19:41:13.259452304Z" level=info msg="CreateContainer within sandbox \"2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:41:13.272327 env[1153]: time="2024-02-12T19:41:13.272276455Z" level=info msg="CreateContainer within sandbox \"2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"96018e35e5f626f1006f36c98eea7b87366984d3626c2b7903e9c60021964edf\"" Feb 12 19:41:13.272777 env[1153]: time="2024-02-12T19:41:13.272748575Z" level=info msg="StartContainer for \"96018e35e5f626f1006f36c98eea7b87366984d3626c2b7903e9c60021964edf\"" Feb 12 19:41:13.286460 systemd[1]: Started cri-containerd-96018e35e5f626f1006f36c98eea7b87366984d3626c2b7903e9c60021964edf.scope. Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.309000 audit: BPF prog-id=155 op=LOAD Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3543 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303138653335653566363236663130303666333663393865656137 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3543 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303138653335653566363236663130303666333663393865656137 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.310000 audit: BPF prog-id=156 op=LOAD Feb 12 19:41:13.310000 audit[3584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3543 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303138653335653566363236663130303666333663393865656137 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.311000 audit: BPF prog-id=157 op=LOAD Feb 12 19:41:13.311000 audit[3584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3543 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303138653335653566363236663130303666333663393865656137 Feb 12 19:41:13.312000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:41:13.312000 audit: BPF prog-id=156 op=UNLOAD Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:13.312000 audit: BPF prog-id=158 op=LOAD Feb 12 19:41:13.312000 audit[3584]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3543 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936303138653335653566363236663130303666333663393865656137 Feb 12 19:41:13.324890 env[1153]: time="2024-02-12T19:41:13.324845860Z" level=info msg="StartContainer for \"96018e35e5f626f1006f36c98eea7b87366984d3626c2b7903e9c60021964edf\" returns successfully" Feb 12 19:41:13.942035 kubelet[2039]: E0212 19:41:13.941999 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:13.990000 audit[3640]: NETFILTER_CFG table=filter:118 family=2 entries=12 op=nft_register_rule pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:13.990000 audit[3640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffff8c9d900 a2=0 a3=ffff9f4246c0 items=0 ppid=2256 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:13.991000 audit[3640]: NETFILTER_CFG table=nat:119 family=2 entries=30 op=nft_register_rule pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:13.991000 audit[3640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=fffff8c9d900 a2=0 a3=ffff9f4246c0 items=0 ppid=2256 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:13.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.473707 systemd-networkd[1051]: cali4e1563fd68b: Gained IPv6LL Feb 12 19:41:14.943434 kubelet[2039]: E0212 19:41:14.943409 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:14.954560 kubelet[2039]: I0212 19:41:14.954526 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-m5s2b" podStartSLOduration=27.954467597 pod.CreationTimestamp="2024-02-12 19:40:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:13.955731312 +0000 UTC m=+40.288870528" watchObservedRunningTime="2024-02-12 19:41:14.954467597 +0000 UTC m=+41.287606813" Feb 12 19:41:14.989000 audit[3672]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=3672 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.989000 audit[3672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffeb5be1f0 a2=0 a3=ffffbbf9f6c0 items=0 ppid=2256 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.990000 audit[3672]: NETFILTER_CFG table=nat:121 family=2 entries=51 op=nft_register_chain pid=3672 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.990000 audit[3672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=ffffeb5be1f0 a2=0 a3=ffffbbf9f6c0 items=0 ppid=2256 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:15.945116 kubelet[2039]: E0212 19:41:15.945083 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:16.831002 env[1153]: time="2024-02-12T19:41:16.830835309Z" level=info msg="StopPodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\"" Feb 12 19:41:16.831302 env[1153]: time="2024-02-12T19:41:16.830906109Z" level=info msg="StopPodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\"" Feb 12 19:41:16.831302 env[1153]: time="2024-02-12T19:41:16.830976909Z" level=info msg="StopPodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\"" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.892 [INFO][3728] k8s.go 578: Cleaning up netns ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.892 [INFO][3728] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" iface="eth0" netns="/var/run/netns/cni-bf339e49-0837-4853-396f-21ee258b9153" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.892 [INFO][3728] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" iface="eth0" netns="/var/run/netns/cni-bf339e49-0837-4853-396f-21ee258b9153" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.892 [INFO][3728] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" iface="eth0" netns="/var/run/netns/cni-bf339e49-0837-4853-396f-21ee258b9153" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.892 [INFO][3728] k8s.go 585: Releasing IP address(es) ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.892 [INFO][3728] utils.go 188: Calico CNI releasing IP address ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.918 [INFO][3745] ipam_plugin.go 415: Releasing address using handleID ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.918 [INFO][3745] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.918 [INFO][3745] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.928 [WARNING][3745] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.928 [INFO][3745] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.929 [INFO][3745] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:16.932319 env[1153]: 2024-02-12 19:41:16.931 [INFO][3728] k8s.go 591: Teardown processing complete. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:16.936948 env[1153]: time="2024-02-12T19:41:16.932476412Z" level=info msg="TearDown network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" successfully" Feb 12 19:41:16.936948 env[1153]: time="2024-02-12T19:41:16.932527772Z" level=info msg="StopPodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" returns successfully" Feb 12 19:41:16.934114 systemd[1]: run-netns-cni\x2dbf339e49\x2d0837\x2d4853\x2d396f\x2d21ee258b9153.mount: Deactivated successfully. Feb 12 19:41:16.937236 kubelet[2039]: E0212 19:41:16.932824 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:16.937742 env[1153]: time="2024-02-12T19:41:16.937710569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-gfkrt,Uid:6d639f2a-4069-400b-8214-b7e86392dee6,Namespace:kube-system,Attempt:1,}" Feb 12 19:41:16.947216 kubelet[2039]: E0212 19:41:16.947146 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.893 [INFO][3713] k8s.go 578: Cleaning up netns ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.893 [INFO][3713] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" iface="eth0" netns="/var/run/netns/cni-624c8733-45ff-37be-66d5-90bf23926c8f" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.893 [INFO][3713] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" iface="eth0" netns="/var/run/netns/cni-624c8733-45ff-37be-66d5-90bf23926c8f" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.893 [INFO][3713] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" iface="eth0" netns="/var/run/netns/cni-624c8733-45ff-37be-66d5-90bf23926c8f" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.893 [INFO][3713] k8s.go 585: Releasing IP address(es) ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.893 [INFO][3713] utils.go 188: Calico CNI releasing IP address ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.921 [INFO][3746] ipam_plugin.go 415: Releasing address using handleID ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.921 [INFO][3746] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.929 [INFO][3746] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.948 [WARNING][3746] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.948 [INFO][3746] ipam_plugin.go 443: Releasing address using workloadID ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.951 [INFO][3746] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:16.959808 env[1153]: 2024-02-12 19:41:16.957 [INFO][3713] k8s.go 591: Teardown processing complete. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:16.962123 env[1153]: time="2024-02-12T19:41:16.960046157Z" level=info msg="TearDown network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" successfully" Feb 12 19:41:16.962123 env[1153]: time="2024-02-12T19:41:16.960081997Z" level=info msg="StopPodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" returns successfully" Feb 12 19:41:16.962123 env[1153]: time="2024-02-12T19:41:16.961093716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85b9d877c4-cl8lx,Uid:2ed2d7d4-a83b-4b06-9d41-036b09ea700c,Namespace:calico-system,Attempt:1,}" Feb 12 19:41:16.962420 systemd[1]: run-netns-cni\x2d624c8733\x2d45ff\x2d37be\x2d66d5\x2d90bf23926c8f.mount: Deactivated successfully. Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.904 [INFO][3729] k8s.go 578: Cleaning up netns ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.904 [INFO][3729] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" iface="eth0" netns="/var/run/netns/cni-61fddf91-758d-bfc9-91df-068fe9f0b6e4" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.904 [INFO][3729] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" iface="eth0" netns="/var/run/netns/cni-61fddf91-758d-bfc9-91df-068fe9f0b6e4" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.904 [INFO][3729] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" iface="eth0" netns="/var/run/netns/cni-61fddf91-758d-bfc9-91df-068fe9f0b6e4" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.905 [INFO][3729] k8s.go 585: Releasing IP address(es) ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.905 [INFO][3729] utils.go 188: Calico CNI releasing IP address ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.941 [INFO][3757] ipam_plugin.go 415: Releasing address using handleID ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.941 [INFO][3757] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.951 [INFO][3757] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.964 [WARNING][3757] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.964 [INFO][3757] ipam_plugin.go 443: Releasing address using workloadID ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.965 [INFO][3757] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:16.969649 env[1153]: 2024-02-12 19:41:16.968 [INFO][3729] k8s.go 591: Teardown processing complete. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:16.972098 env[1153]: time="2024-02-12T19:41:16.971988630Z" level=info msg="TearDown network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" successfully" Feb 12 19:41:16.972217 env[1153]: time="2024-02-12T19:41:16.972194590Z" level=info msg="StopPodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" returns successfully" Feb 12 19:41:16.973659 systemd[1]: run-netns-cni\x2d61fddf91\x2d758d\x2dbfc9\x2d91df\x2d068fe9f0b6e4.mount: Deactivated successfully. Feb 12 19:41:16.974431 env[1153]: time="2024-02-12T19:41:16.974382949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qpv5w,Uid:d948f890-19cf-423e-b6f0-7d2d5941a3ee,Namespace:calico-system,Attempt:1,}" Feb 12 19:41:17.089677 systemd-networkd[1051]: cali7584dd44ff7: Link UP Feb 12 19:41:17.091576 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:17.091655 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7584dd44ff7: link becomes ready Feb 12 19:41:17.090450 systemd-networkd[1051]: cali7584dd44ff7: Gained carrier Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:16.998 [INFO][3767] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--787d4945fb--gfkrt-eth0 coredns-787d4945fb- kube-system 6d639f2a-4069-400b-8214-b7e86392dee6 732 0 2024-02-12 19:40:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-787d4945fb-gfkrt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7584dd44ff7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:16.998 [INFO][3767] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.034 [INFO][3810] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" HandleID="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.048 [INFO][3810] ipam_plugin.go 268: Auto assigning IP ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" HandleID="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c3750), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-787d4945fb-gfkrt", "timestamp":"2024-02-12 19:41:17.034472996 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.049 [INFO][3810] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.049 [INFO][3810] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.049 [INFO][3810] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.054 [INFO][3810] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.060 [INFO][3810] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.068 [INFO][3810] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.069 [INFO][3810] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.073 [INFO][3810] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.073 [INFO][3810] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.074 [INFO][3810] ipam.go 1682: Creating new handle: k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.079 [INFO][3810] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.084 [INFO][3810] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.084 [INFO][3810] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" host="localhost" Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.084 [INFO][3810] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.102669 env[1153]: 2024-02-12 19:41:17.084 [INFO][3810] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" HandleID="k8s-pod-network.33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.103206 env[1153]: 2024-02-12 19:41:17.086 [INFO][3767] k8s.go 385: Populated endpoint ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--gfkrt-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6d639f2a-4069-400b-8214-b7e86392dee6", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-787d4945fb-gfkrt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7584dd44ff7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.103206 env[1153]: 2024-02-12 19:41:17.086 [INFO][3767] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.103206 env[1153]: 2024-02-12 19:41:17.086 [INFO][3767] dataplane_linux.go 68: Setting the host side veth name to cali7584dd44ff7 ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.103206 env[1153]: 2024-02-12 19:41:17.091 [INFO][3767] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.103206 env[1153]: 2024-02-12 19:41:17.091 [INFO][3767] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--gfkrt-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6d639f2a-4069-400b-8214-b7e86392dee6", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec", Pod:"coredns-787d4945fb-gfkrt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7584dd44ff7", MAC:"ce:25:38:85:68:95", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.103206 env[1153]: 2024-02-12 19:41:17.098 [INFO][3767] k8s.go 491: Wrote updated endpoint to datastore ContainerID="33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec" Namespace="kube-system" Pod="coredns-787d4945fb-gfkrt" WorkloadEndpoint="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:17.112000 audit[3852]: NETFILTER_CFG table=filter:122 family=2 entries=30 op=nft_register_chain pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:17.112000 audit[3852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=ffffdcf60e90 a2=0 a3=ffffbb216fa8 items=0 ppid=3276 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.112000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:17.119953 env[1153]: time="2024-02-12T19:41:17.119888472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:17.119953 env[1153]: time="2024-02-12T19:41:17.119926312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:17.119953 env[1153]: time="2024-02-12T19:41:17.119936672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:17.120240 env[1153]: time="2024-02-12T19:41:17.120200432Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec pid=3860 runtime=io.containerd.runc.v2 Feb 12 19:41:17.138192 systemd[1]: Started cri-containerd-33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec.scope. Feb 12 19:41:17.145750 systemd-networkd[1051]: calidfdb211140a: Link UP Feb 12 19:41:17.147690 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidfdb211140a: link becomes ready Feb 12 19:41:17.147561 systemd-networkd[1051]: calidfdb211140a: Gained carrier Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.017 [INFO][3780] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0 calico-kube-controllers-85b9d877c4- calico-system 2ed2d7d4-a83b-4b06-9d41-036b09ea700c 731 0 2024-02-12 19:40:52 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85b9d877c4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-85b9d877c4-cl8lx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calidfdb211140a [] []}} ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.017 [INFO][3780] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.051 [INFO][3818] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" HandleID="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.068 [INFO][3818] ipam_plugin.go 268: Auto assigning IP ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" HandleID="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000303360), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-85b9d877c4-cl8lx", "timestamp":"2024-02-12 19:41:17.051910387 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.068 [INFO][3818] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.086 [INFO][3818] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.086 [INFO][3818] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.091 [INFO][3818] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.104 [INFO][3818] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.111 [INFO][3818] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.114 [INFO][3818] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.117 [INFO][3818] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.117 [INFO][3818] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.122 [INFO][3818] ipam.go 1682: Creating new handle: k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.126 [INFO][3818] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.131 [INFO][3818] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.131 [INFO][3818] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" host="localhost" Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.131 [INFO][3818] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.169656 env[1153]: 2024-02-12 19:41:17.131 [INFO][3818] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" HandleID="k8s-pod-network.ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.170225 env[1153]: 2024-02-12 19:41:17.134 [INFO][3780] k8s.go 385: Populated endpoint ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0", GenerateName:"calico-kube-controllers-85b9d877c4-", Namespace:"calico-system", SelfLink:"", UID:"2ed2d7d4-a83b-4b06-9d41-036b09ea700c", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85b9d877c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-85b9d877c4-cl8lx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidfdb211140a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.170225 env[1153]: 2024-02-12 19:41:17.134 [INFO][3780] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.170225 env[1153]: 2024-02-12 19:41:17.134 [INFO][3780] dataplane_linux.go 68: Setting the host side veth name to calidfdb211140a ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.170225 env[1153]: 2024-02-12 19:41:17.151 [INFO][3780] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.170225 env[1153]: 2024-02-12 19:41:17.151 [INFO][3780] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0", GenerateName:"calico-kube-controllers-85b9d877c4-", Namespace:"calico-system", SelfLink:"", UID:"2ed2d7d4-a83b-4b06-9d41-036b09ea700c", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85b9d877c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca", Pod:"calico-kube-controllers-85b9d877c4-cl8lx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidfdb211140a", MAC:"62:c8:d2:f2:ca:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.170225 env[1153]: 2024-02-12 19:41:17.161 [INFO][3780] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca" Namespace="calico-system" Pod="calico-kube-controllers-85b9d877c4-cl8lx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:17.183487 systemd-networkd[1051]: cali2c38254bf88: Link UP Feb 12 19:41:17.184537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c38254bf88: link becomes ready Feb 12 19:41:17.184719 systemd-networkd[1051]: cali2c38254bf88: Gained carrier Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.192000 audit: BPF prog-id=159 op=LOAD Feb 12 19:41:17.192000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.192000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333626137383031383032383338336366623061353063343530316165 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333626137383031383032383338336366623061353063343530316165 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.193000 audit: BPF prog-id=160 op=LOAD Feb 12 19:41:17.193000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333626137383031383032383338336366623061353063343530316165 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.194000 audit: BPF prog-id=161 op=LOAD Feb 12 19:41:17.194000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333626137383031383032383338336366623061353063343530316165 Feb 12 19:41:17.195000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:41:17.195000 audit: BPF prog-id=160 op=UNLOAD Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.195000 audit: BPF prog-id=162 op=LOAD Feb 12 19:41:17.195000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333626137383031383032383338336366623061353063343530316165 Feb 12 19:41:17.197912 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:41:17.200938 env[1153]: time="2024-02-12T19:41:17.200869589Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:17.201043 env[1153]: time="2024-02-12T19:41:17.200952749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:17.201043 env[1153]: time="2024-02-12T19:41:17.200980149Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.034 [INFO][3793] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--qpv5w-eth0 csi-node-driver- calico-system d948f890-19cf-423e-b6f0-7d2d5941a3ee 733 0 2024-02-12 19:40:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-qpv5w eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali2c38254bf88 [] []}} ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.034 [INFO][3793] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.074 [INFO][3826] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" HandleID="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.087 [INFO][3826] ipam_plugin.go 268: Auto assigning IP ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" HandleID="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000229eb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-qpv5w", "timestamp":"2024-02-12 19:41:17.074442775 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.087 [INFO][3826] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.131 [INFO][3826] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.132 [INFO][3826] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.134 [INFO][3826] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.142 [INFO][3826] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.148 [INFO][3826] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.160 [INFO][3826] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.162 [INFO][3826] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.162 [INFO][3826] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.167 [INFO][3826] ipam.go 1682: Creating new handle: k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.173 [INFO][3826] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.180 [INFO][3826] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.180 [INFO][3826] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" host="localhost" Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.180 [INFO][3826] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.201169 env[1153]: 2024-02-12 19:41:17.180 [INFO][3826] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" HandleID="k8s-pod-network.8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.201723 env[1153]: 2024-02-12 19:41:17.182 [INFO][3793] k8s.go 385: Populated endpoint ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qpv5w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d948f890-19cf-423e-b6f0-7d2d5941a3ee", ResourceVersion:"733", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-qpv5w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2c38254bf88", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.201723 env[1153]: 2024-02-12 19:41:17.182 [INFO][3793] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.201723 env[1153]: 2024-02-12 19:41:17.182 [INFO][3793] dataplane_linux.go 68: Setting the host side veth name to cali2c38254bf88 ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.201723 env[1153]: 2024-02-12 19:41:17.184 [INFO][3793] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.201723 env[1153]: 2024-02-12 19:41:17.187 [INFO][3793] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qpv5w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d948f890-19cf-423e-b6f0-7d2d5941a3ee", ResourceVersion:"733", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c", Pod:"csi-node-driver-qpv5w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2c38254bf88", MAC:"c6:18:ad:b3:83:d9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.201723 env[1153]: 2024-02-12 19:41:17.196 [INFO][3793] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c" Namespace="calico-system" Pod="csi-node-driver-qpv5w" WorkloadEndpoint="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:17.200000 audit[3919]: NETFILTER_CFG table=filter:123 family=2 entries=44 op=nft_register_chain pid=3919 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:17.200000 audit[3919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffd506ee30 a2=0 a3=ffff9e293fa8 items=0 ppid=3276 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:17.202143 env[1153]: time="2024-02-12T19:41:17.201234589Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca pid=3914 runtime=io.containerd.runc.v2 Feb 12 19:41:17.225000 audit[3951]: NETFILTER_CFG table=filter:124 family=2 entries=42 op=nft_register_chain pid=3951 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:17.225000 audit[3951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffd3534a80 a2=0 a3=ffff9e45afa8 items=0 ppid=3276 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:17.232682 env[1153]: time="2024-02-12T19:41:17.232602613Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:17.232682 env[1153]: time="2024-02-12T19:41:17.232644013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:17.232682 env[1153]: time="2024-02-12T19:41:17.232654533Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:17.233153 env[1153]: time="2024-02-12T19:41:17.233112252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-gfkrt,Uid:6d639f2a-4069-400b-8214-b7e86392dee6,Namespace:kube-system,Attempt:1,} returns sandbox id \"33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec\"" Feb 12 19:41:17.233436 env[1153]: time="2024-02-12T19:41:17.233225492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c pid=3962 runtime=io.containerd.runc.v2 Feb 12 19:41:17.234520 kubelet[2039]: E0212 19:41:17.234049 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:17.238389 env[1153]: time="2024-02-12T19:41:17.237619810Z" level=info msg="CreateContainer within sandbox \"33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:41:17.244166 systemd[1]: Started cri-containerd-ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca.scope. Feb 12 19:41:17.248503 env[1153]: time="2024-02-12T19:41:17.248445644Z" level=info msg="CreateContainer within sandbox \"33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6eafee067877df36080fb655d6eb361cdf98cf65b562c75bec22db860085f622\"" Feb 12 19:41:17.249099 env[1153]: time="2024-02-12T19:41:17.249068764Z" level=info msg="StartContainer for \"6eafee067877df36080fb655d6eb361cdf98cf65b562c75bec22db860085f622\"" Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.261000 audit: BPF prog-id=163 op=LOAD Feb 12 19:41:17.263373 systemd[1]: Started cri-containerd-8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c.scope. Feb 12 19:41:17.265000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.265000 audit[3925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3914 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.269167 systemd[1]: Started cri-containerd-6eafee067877df36080fb655d6eb361cdf98cf65b562c75bec22db860085f622.scope. Feb 12 19:41:17.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666383335336430353131633237373234373362653137303663656539 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3914 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666383335336430353131633237373234373362653137303663656539 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.269000 audit: BPF prog-id=164 op=LOAD Feb 12 19:41:17.269000 audit[3925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3914 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666383335336430353131633237373234373362653137303663656539 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit: BPF prog-id=165 op=LOAD Feb 12 19:41:17.270000 audit[3925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3914 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666383335336430353131633237373234373362653137303663656539 Feb 12 19:41:17.270000 audit: BPF prog-id=165 op=UNLOAD Feb 12 19:41:17.270000 audit: BPF prog-id=164 op=UNLOAD Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.270000 audit: BPF prog-id=166 op=LOAD Feb 12 19:41:17.270000 audit[3925]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3914 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666383335336430353131633237373234373362653137303663656539 Feb 12 19:41:17.273472 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.295000 audit: BPF prog-id=167 op=LOAD Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3860 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616665653036373837376466333630383066623635356436656233 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3860 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616665653036373837376466333630383066623635356436656233 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit: BPF prog-id=168 op=LOAD Feb 12 19:41:17.296000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3860 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616665653036373837376466333630383066623635356436656233 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit: BPF prog-id=169 op=LOAD Feb 12 19:41:17.296000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3860 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616665653036373837376466333630383066623635356436656233 Feb 12 19:41:17.296000 audit: BPF prog-id=169 op=UNLOAD Feb 12 19:41:17.296000 audit: BPF prog-id=168 op=UNLOAD Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.296000 audit: BPF prog-id=170 op=LOAD Feb 12 19:41:17.296000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3860 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616665653036373837376466333630383066623635356436656233 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit: BPF prog-id=171 op=LOAD Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656236343239646662363765386233333462356262623236363839 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656236343239646662363765386233333462356262623236363839 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit: BPF prog-id=172 op=LOAD Feb 12 19:41:17.297000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656236343239646662363765386233333462356262623236363839 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit: BPF prog-id=173 op=LOAD Feb 12 19:41:17.297000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656236343239646662363765386233333462356262623236363839 Feb 12 19:41:17.297000 audit: BPF prog-id=173 op=UNLOAD Feb 12 19:41:17.297000 audit: BPF prog-id=172 op=UNLOAD Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:17.297000 audit: BPF prog-id=174 op=LOAD Feb 12 19:41:17.297000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656236343239646662363765386233333462356262623236363839 Feb 12 19:41:17.300719 env[1153]: time="2024-02-12T19:41:17.300591057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85b9d877c4-cl8lx,Uid:2ed2d7d4-a83b-4b06-9d41-036b09ea700c,Namespace:calico-system,Attempt:1,} returns sandbox id \"ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca\"" Feb 12 19:41:17.301312 systemd-resolved[1094]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:41:17.302382 env[1153]: time="2024-02-12T19:41:17.302329176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:41:17.313226 env[1153]: time="2024-02-12T19:41:17.313186971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qpv5w,Uid:d948f890-19cf-423e-b6f0-7d2d5941a3ee,Namespace:calico-system,Attempt:1,} returns sandbox id \"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c\"" Feb 12 19:41:17.317743 env[1153]: time="2024-02-12T19:41:17.317702528Z" level=info msg="StartContainer for \"6eafee067877df36080fb655d6eb361cdf98cf65b562c75bec22db860085f622\" returns successfully" Feb 12 19:41:17.702794 kubelet[2039]: I0212 19:41:17.702557 2039 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:41:17.703783 kubelet[2039]: E0212 19:41:17.703767 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:17.859626 systemd[1]: Started sshd@7-10.0.0.3:22-10.0.0.1:35054.service. Feb 12 19:41:17.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.3:22-10.0.0.1:35054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:17.909000 audit[4097]: USER_ACCT pid=4097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:17.910471 sshd[4097]: Accepted publickey for core from 10.0.0.1 port 35054 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:17.911000 audit[4097]: CRED_ACQ pid=4097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:17.911000 audit[4097]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9f63ac0 a2=3 a3=1 items=0 ppid=1 pid=4097 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:17.911000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:17.912105 sshd[4097]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:17.916069 systemd-logind[1139]: New session 8 of user core. Feb 12 19:41:17.916841 systemd[1]: Started session-8.scope. Feb 12 19:41:17.924000 audit[4097]: USER_START pid=4097 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:17.925000 audit[4099]: CRED_ACQ pid=4099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:17.953161 kubelet[2039]: E0212 19:41:17.952830 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:17.955219 kubelet[2039]: E0212 19:41:17.955199 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:17.979099 kubelet[2039]: I0212 19:41:17.979047 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-gfkrt" podStartSLOduration=30.979013422 pod.CreationTimestamp="2024-02-12 19:40:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:17.965872789 +0000 UTC m=+44.299011965" watchObservedRunningTime="2024-02-12 19:41:17.979013422 +0000 UTC m=+44.312152638" Feb 12 19:41:18.019000 audit[4136]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:18.019000 audit[4136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff4ca5120 a2=0 a3=ffffb77b56c0 items=0 ppid=2256 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:18.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:18.020000 audit[4136]: NETFILTER_CFG table=nat:126 family=2 entries=60 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:18.020000 audit[4136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=fffff4ca5120 a2=0 a3=ffffb77b56c0 items=0 ppid=2256 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:18.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:18.065899 sshd[4097]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:18.066000 audit[4097]: USER_END pid=4097 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:18.066000 audit[4097]: CRED_DISP pid=4097 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:18.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.3:22-10.0.0.1:35054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:18.068557 systemd[1]: sshd@7-10.0.0.3:22-10.0.0.1:35054.service: Deactivated successfully. Feb 12 19:41:18.069291 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:41:18.070080 systemd-logind[1139]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:41:18.070703 systemd-logind[1139]: Removed session 8. Feb 12 19:41:18.076000 audit[4163]: NETFILTER_CFG table=filter:127 family=2 entries=6 op=nft_register_rule pid=4163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:18.076000 audit[4163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffd5d7750 a2=0 a3=ffffa797b6c0 items=0 ppid=2256 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:18.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:18.081000 audit[4163]: NETFILTER_CFG table=nat:128 family=2 entries=72 op=nft_register_chain pid=4163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:18.081000 audit[4163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffffd5d7750 a2=0 a3=ffffa797b6c0 items=0 ppid=2256 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:18.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:18.249609 systemd-networkd[1051]: cali2c38254bf88: Gained IPv6LL Feb 12 19:41:18.569610 systemd-networkd[1051]: cali7584dd44ff7: Gained IPv6LL Feb 12 19:41:18.633660 systemd-networkd[1051]: calidfdb211140a: Gained IPv6LL Feb 12 19:41:18.957215 kubelet[2039]: E0212 19:41:18.957189 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:19.324041 env[1153]: time="2024-02-12T19:41:19.323828732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:19.325362 env[1153]: time="2024-02-12T19:41:19.325334091Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:19.326705 env[1153]: time="2024-02-12T19:41:19.326664331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:19.328552 env[1153]: time="2024-02-12T19:41:19.328526370Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:19.329064 env[1153]: time="2024-02-12T19:41:19.329034650Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 19:41:19.330365 env[1153]: time="2024-02-12T19:41:19.330338209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:41:19.342443 env[1153]: time="2024-02-12T19:41:19.342407683Z" level=info msg="CreateContainer within sandbox \"ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:41:19.352774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1996857030.mount: Deactivated successfully. Feb 12 19:41:19.357519 env[1153]: time="2024-02-12T19:41:19.357475677Z" level=info msg="CreateContainer within sandbox \"ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c8a07cd228b735a835487b5f69ad8a5fae83ec6e21cc085b329b714e2630ccf9\"" Feb 12 19:41:19.358137 env[1153]: time="2024-02-12T19:41:19.357990916Z" level=info msg="StartContainer for \"c8a07cd228b735a835487b5f69ad8a5fae83ec6e21cc085b329b714e2630ccf9\"" Feb 12 19:41:19.375920 systemd[1]: Started cri-containerd-c8a07cd228b735a835487b5f69ad8a5fae83ec6e21cc085b329b714e2630ccf9.scope. Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.426853 kernel: kauditd_printk_skb: 379 callbacks suppressed Feb 12 19:41:19.426912 kernel: audit: type=1400 audit(1707766879.425:1309): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430286 kernel: audit: type=1400 audit(1707766879.425:1310): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430346 kernel: audit: type=1400 audit(1707766879.425:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.433725 kernel: audit: type=1400 audit(1707766879.425:1312): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.433780 kernel: audit: type=1400 audit(1707766879.425:1313): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.437215 kernel: audit: type=1400 audit(1707766879.425:1314): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.437259 kernel: audit: type=1400 audit(1707766879.425:1315): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.440695 kernel: audit: type=1400 audit(1707766879.425:1316): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.440757 kernel: audit: type=1400 audit(1707766879.425:1317): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.442339 kernel: audit: type=1400 audit(1707766879.426:1318): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.426000 audit: BPF prog-id=175 op=LOAD Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3914 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:19.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613037636432323862373335613833353438376235663639616438 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3914 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:19.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613037636432323862373335613833353438376235663639616438 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.428000 audit: BPF prog-id=176 op=LOAD Feb 12 19:41:19.428000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3914 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:19.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613037636432323862373335613833353438376235663639616438 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.430000 audit: BPF prog-id=177 op=LOAD Feb 12 19:41:19.430000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3914 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:19.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613037636432323862373335613833353438376235663639616438 Feb 12 19:41:19.431000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:41:19.431000 audit: BPF prog-id=176 op=UNLOAD Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:19.431000 audit: BPF prog-id=178 op=LOAD Feb 12 19:41:19.431000 audit[4184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3914 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:19.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613037636432323862373335613833353438376235663639616438 Feb 12 19:41:19.475161 env[1153]: time="2024-02-12T19:41:19.475095862Z" level=info msg="StartContainer for \"c8a07cd228b735a835487b5f69ad8a5fae83ec6e21cc085b329b714e2630ccf9\" returns successfully" Feb 12 19:41:19.960814 kubelet[2039]: E0212 19:41:19.960565 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:20.560484 env[1153]: time="2024-02-12T19:41:20.560431139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.561956 env[1153]: time="2024-02-12T19:41:20.561926539Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.563569 env[1153]: time="2024-02-12T19:41:20.563541058Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.564685 env[1153]: time="2024-02-12T19:41:20.564661098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.565041 env[1153]: time="2024-02-12T19:41:20.565010498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:41:20.566681 env[1153]: time="2024-02-12T19:41:20.566528217Z" level=info msg="CreateContainer within sandbox \"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:41:20.581039 env[1153]: time="2024-02-12T19:41:20.580995491Z" level=info msg="CreateContainer within sandbox \"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"43d1533af3596b1ea83dad2a3466044c070fb2a207f0e8e95d58111ff006e414\"" Feb 12 19:41:20.581683 env[1153]: time="2024-02-12T19:41:20.581635650Z" level=info msg="StartContainer for \"43d1533af3596b1ea83dad2a3466044c070fb2a207f0e8e95d58111ff006e414\"" Feb 12 19:41:20.600975 systemd[1]: Started cri-containerd-43d1533af3596b1ea83dad2a3466044c070fb2a207f0e8e95d58111ff006e414.scope. Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3962 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:20.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643135333361663335393662316561383364616432613334363630 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit: BPF prog-id=179 op=LOAD Feb 12 19:41:20.633000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3962 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:20.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643135333361663335393662316561383364616432613334363630 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit: BPF prog-id=180 op=LOAD Feb 12 19:41:20.633000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3962 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:20.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643135333361663335393662316561383364616432613334363630 Feb 12 19:41:20.633000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:41:20.633000 audit: BPF prog-id=179 op=UNLOAD Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:20.633000 audit: BPF prog-id=181 op=LOAD Feb 12 19:41:20.633000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3962 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:20.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643135333361663335393662316561383364616432613334363630 Feb 12 19:41:20.646060 env[1153]: time="2024-02-12T19:41:20.646016263Z" level=info msg="StartContainer for \"43d1533af3596b1ea83dad2a3466044c070fb2a207f0e8e95d58111ff006e414\" returns successfully" Feb 12 19:41:20.649197 env[1153]: time="2024-02-12T19:41:20.649170741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:41:21.026898 kubelet[2039]: I0212 19:41:21.026597 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85b9d877c4-cl8lx" podStartSLOduration=-9.223372007828226e+09 pod.CreationTimestamp="2024-02-12 19:40:52 +0000 UTC" firstStartedPulling="2024-02-12 19:41:17.301749177 +0000 UTC m=+43.634888393" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:19.971014194 +0000 UTC m=+46.304153410" watchObservedRunningTime="2024-02-12 19:41:21.026548939 +0000 UTC m=+47.359688115" Feb 12 19:41:21.978378 env[1153]: time="2024-02-12T19:41:21.978334955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.979770 env[1153]: time="2024-02-12T19:41:21.979726194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.980875 env[1153]: time="2024-02-12T19:41:21.980848714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.982174 env[1153]: time="2024-02-12T19:41:21.982138673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.982717 env[1153]: time="2024-02-12T19:41:21.982688633Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:41:21.984191 env[1153]: time="2024-02-12T19:41:21.984158552Z" level=info msg="CreateContainer within sandbox \"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:41:21.995167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3067848240.mount: Deactivated successfully. Feb 12 19:41:21.995403 env[1153]: time="2024-02-12T19:41:21.995254868Z" level=info msg="CreateContainer within sandbox \"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bd6929f9f9e776a672dc84fbcec3278ca4d55ee299f9e6ab23ce28ee90c2c6e9\"" Feb 12 19:41:21.995791 env[1153]: time="2024-02-12T19:41:21.995765468Z" level=info msg="StartContainer for \"bd6929f9f9e776a672dc84fbcec3278ca4d55ee299f9e6ab23ce28ee90c2c6e9\"" Feb 12 19:41:22.015350 systemd[1]: Started cri-containerd-bd6929f9f9e776a672dc84fbcec3278ca4d55ee299f9e6ab23ce28ee90c2c6e9.scope. Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3962 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363932396639663965373736613637326463383466626365633332 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit: BPF prog-id=182 op=LOAD Feb 12 19:41:22.043000 audit[4278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3962 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363932396639663965373736613637326463383466626365633332 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit: BPF prog-id=183 op=LOAD Feb 12 19:41:22.043000 audit[4278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3962 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363932396639663965373736613637326463383466626365633332 Feb 12 19:41:22.043000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:41:22.043000 audit: BPF prog-id=182 op=UNLOAD Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:22.043000 audit: BPF prog-id=184 op=LOAD Feb 12 19:41:22.043000 audit[4278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3962 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363932396639663965373736613637326463383466626365633332 Feb 12 19:41:22.059350 env[1153]: time="2024-02-12T19:41:22.059248763Z" level=info msg="StartContainer for \"bd6929f9f9e776a672dc84fbcec3278ca4d55ee299f9e6ab23ce28ee90c2c6e9\" returns successfully" Feb 12 19:41:22.850971 kubelet[2039]: I0212 19:41:22.850879 2039 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:41:22.850971 kubelet[2039]: I0212 19:41:22.850914 2039 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:41:22.978576 kubelet[2039]: I0212 19:41:22.978537 2039 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qpv5w" podStartSLOduration=-9.223372005876305e+09 pod.CreationTimestamp="2024-02-12 19:40:52 +0000 UTC" firstStartedPulling="2024-02-12 19:41:17.315809569 +0000 UTC m=+43.648948785" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:22.977829455 +0000 UTC m=+49.310968671" watchObservedRunningTime="2024-02-12 19:41:22.978471295 +0000 UTC m=+49.311610471" Feb 12 19:41:23.070734 systemd[1]: Started sshd@8-10.0.0.3:22-10.0.0.1:41626.service. Feb 12 19:41:23.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.3:22-10.0.0.1:41626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:23.116000 audit[4313]: USER_ACCT pid=4313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:23.117540 sshd[4313]: Accepted publickey for core from 10.0.0.1 port 41626 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:23.118000 audit[4313]: CRED_ACQ pid=4313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:23.118000 audit[4313]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee6eade0 a2=3 a3=1 items=0 ppid=1 pid=4313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:23.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:23.119077 sshd[4313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:23.122562 systemd-logind[1139]: New session 9 of user core. Feb 12 19:41:23.123406 systemd[1]: Started session-9.scope. Feb 12 19:41:23.126000 audit[4313]: USER_START pid=4313 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:23.127000 audit[4315]: CRED_ACQ pid=4315 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:23.263359 sshd[4313]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:23.264000 audit[4313]: USER_END pid=4313 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:23.264000 audit[4313]: CRED_DISP pid=4313 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:23.266252 systemd[1]: sshd@8-10.0.0.3:22-10.0.0.1:41626.service: Deactivated successfully. Feb 12 19:41:23.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.3:22-10.0.0.1:41626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:23.267106 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:41:23.267689 systemd-logind[1139]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:41:23.268415 systemd-logind[1139]: Removed session 9. Feb 12 19:41:28.268452 systemd[1]: Started sshd@9-10.0.0.3:22-10.0.0.1:41634.service. Feb 12 19:41:28.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.3:22-10.0.0.1:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:28.269630 kernel: kauditd_printk_skb: 144 callbacks suppressed Feb 12 19:41:28.269692 kernel: audit: type=1130 audit(1707766888.268:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.3:22-10.0.0.1:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:28.313000 audit[4332]: USER_ACCT pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.314403 sshd[4332]: Accepted publickey for core from 10.0.0.1 port 41634 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:28.314000 audit[4332]: CRED_ACQ pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.317455 sshd[4332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:28.319272 kernel: audit: type=1101 audit(1707766888.313:1349): pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.319351 kernel: audit: type=1103 audit(1707766888.314:1350): pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.319373 kernel: audit: type=1006 audit(1707766888.315:1351): pid=4332 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:41:28.315000 audit[4332]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefbed900 a2=3 a3=1 items=0 ppid=1 pid=4332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:28.323478 kernel: audit: type=1300 audit(1707766888.315:1351): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefbed900 a2=3 a3=1 items=0 ppid=1 pid=4332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:28.315000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:28.324514 kernel: audit: type=1327 audit(1707766888.315:1351): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:28.326921 systemd[1]: Started session-10.scope. Feb 12 19:41:28.327629 systemd-logind[1139]: New session 10 of user core. Feb 12 19:41:28.330000 audit[4332]: USER_START pid=4332 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.333513 kernel: audit: type=1105 audit(1707766888.330:1352): pid=4332 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.333562 kernel: audit: type=1103 audit(1707766888.331:1353): pid=4334 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.331000 audit[4334]: CRED_ACQ pid=4334 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.448098 sshd[4332]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:28.449000 audit[4332]: USER_END pid=4332 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.452610 systemd[1]: sshd@9-10.0.0.3:22-10.0.0.1:41634.service: Deactivated successfully. Feb 12 19:41:28.449000 audit[4332]: CRED_DISP pid=4332 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.453423 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:41:28.454006 systemd-logind[1139]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:41:28.454628 systemd-logind[1139]: Removed session 10. Feb 12 19:41:28.455063 kernel: audit: type=1106 audit(1707766888.449:1354): pid=4332 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.455096 kernel: audit: type=1104 audit(1707766888.449:1355): pid=4332 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:28.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.3:22-10.0.0.1:41634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:30.824000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.824000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.824000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f22ba0 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:41:30.824000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:30.824000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40008fab40 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:41:30.824000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:30.867000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.867000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400f5e4690 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:41:30.867000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:41:30.867000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.867000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4002c90d40 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:41:30.867000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:41:30.874000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.874000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400e6b2c00 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:41:30.874000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:41:30.881000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.881000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400e6b2de0 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:41:30.881000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:41:30.884000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.884000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400f5e4720 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:41:30.884000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:41:30.884000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:30.884000 audit[1932]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40034bd9a0 a2=fc6 a3=0 items=0 ppid=1775 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c969 key=(null) Feb 12 19:41:30.884000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E33002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Feb 12 19:41:33.452264 systemd[1]: Started sshd@10-10.0.0.3:22-10.0.0.1:54008.service. Feb 12 19:41:33.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.3:22-10.0.0.1:54008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.455265 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:41:33.455327 kernel: audit: type=1130 audit(1707766893.451:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.3:22-10.0.0.1:54008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.498000 audit[4354]: USER_ACCT pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.498969 sshd[4354]: Accepted publickey for core from 10.0.0.1 port 54008 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:33.500316 sshd[4354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:33.499000 audit[4354]: CRED_ACQ pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.503228 kernel: audit: type=1101 audit(1707766893.498:1366): pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.503290 kernel: audit: type=1103 audit(1707766893.499:1367): pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.503312 kernel: audit: type=1006 audit(1707766893.499:1368): pid=4354 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:41:33.499000 audit[4354]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe68d9bc0 a2=3 a3=1 items=0 ppid=1 pid=4354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.504594 systemd[1]: Started session-11.scope. Feb 12 19:41:33.505477 systemd-logind[1139]: New session 11 of user core. Feb 12 19:41:33.506704 kernel: audit: type=1300 audit(1707766893.499:1368): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe68d9bc0 a2=3 a3=1 items=0 ppid=1 pid=4354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.506769 kernel: audit: type=1327 audit(1707766893.499:1368): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:33.499000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:33.509000 audit[4354]: USER_START pid=4354 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.510000 audit[4356]: CRED_ACQ pid=4356 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.514030 kernel: audit: type=1105 audit(1707766893.509:1369): pid=4354 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.514092 kernel: audit: type=1103 audit(1707766893.510:1370): pid=4356 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.616708 sshd[4354]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:33.616000 audit[4354]: USER_END pid=4354 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.619000 audit[4354]: CRED_DISP pid=4354 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.622264 kernel: audit: type=1106 audit(1707766893.616:1371): pid=4354 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.622316 kernel: audit: type=1104 audit(1707766893.619:1372): pid=4354 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:33.622662 systemd[1]: sshd@10-10.0.0.3:22-10.0.0.1:54008.service: Deactivated successfully. Feb 12 19:41:33.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.3:22-10.0.0.1:54008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.623418 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:41:33.624255 systemd-logind[1139]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:41:33.625032 systemd-logind[1139]: Removed session 11. Feb 12 19:41:33.760624 env[1153]: time="2024-02-12T19:41:33.760522203Z" level=info msg="StopPodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\"" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.796 [WARNING][4384] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qpv5w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d948f890-19cf-423e-b6f0-7d2d5941a3ee", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c", Pod:"csi-node-driver-qpv5w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2c38254bf88", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.796 [INFO][4384] k8s.go 578: Cleaning up netns ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.796 [INFO][4384] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" iface="eth0" netns="" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.796 [INFO][4384] k8s.go 585: Releasing IP address(es) ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.796 [INFO][4384] utils.go 188: Calico CNI releasing IP address ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.824 [INFO][4391] ipam_plugin.go 415: Releasing address using handleID ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.824 [INFO][4391] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.824 [INFO][4391] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.834 [WARNING][4391] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.834 [INFO][4391] ipam_plugin.go 443: Releasing address using workloadID ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.837 [INFO][4391] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:33.841607 env[1153]: 2024-02-12 19:41:33.840 [INFO][4384] k8s.go 591: Teardown processing complete. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.842091 env[1153]: time="2024-02-12T19:41:33.841632188Z" level=info msg="TearDown network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" successfully" Feb 12 19:41:33.842091 env[1153]: time="2024-02-12T19:41:33.841659028Z" level=info msg="StopPodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" returns successfully" Feb 12 19:41:33.842091 env[1153]: time="2024-02-12T19:41:33.842030908Z" level=info msg="RemovePodSandbox for \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\"" Feb 12 19:41:33.842091 env[1153]: time="2024-02-12T19:41:33.842065148Z" level=info msg="Forcibly stopping sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\"" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.874 [WARNING][4416] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qpv5w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d948f890-19cf-423e-b6f0-7d2d5941a3ee", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8eeb6429dfb67e8b334b5bbb26689858208ee68905650f82ad0c1a459fc36c2c", Pod:"csi-node-driver-qpv5w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2c38254bf88", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.874 [INFO][4416] k8s.go 578: Cleaning up netns ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.874 [INFO][4416] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" iface="eth0" netns="" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.874 [INFO][4416] k8s.go 585: Releasing IP address(es) ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.874 [INFO][4416] utils.go 188: Calico CNI releasing IP address ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.891 [INFO][4424] ipam_plugin.go 415: Releasing address using handleID ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.891 [INFO][4424] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.891 [INFO][4424] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.901 [WARNING][4424] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.901 [INFO][4424] ipam_plugin.go 443: Releasing address using workloadID ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" HandleID="k8s-pod-network.04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Workload="localhost-k8s-csi--node--driver--qpv5w-eth0" Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.902 [INFO][4424] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:33.905664 env[1153]: 2024-02-12 19:41:33.904 [INFO][4416] k8s.go 591: Teardown processing complete. ContainerID="04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015" Feb 12 19:41:33.906096 env[1153]: time="2024-02-12T19:41:33.905680096Z" level=info msg="TearDown network for sandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" successfully" Feb 12 19:41:33.913247 env[1153]: time="2024-02-12T19:41:33.913184694Z" level=info msg="RemovePodSandbox \"04157d2bda3b1f3650218c31e914eef0bdd1b18d06e8ab05e5d15a08eb155015\" returns successfully" Feb 12 19:41:33.913748 env[1153]: time="2024-02-12T19:41:33.913721054Z" level=info msg="StopPodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\"" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.968 [WARNING][4447] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0", GenerateName:"calico-kube-controllers-85b9d877c4-", Namespace:"calico-system", SelfLink:"", UID:"2ed2d7d4-a83b-4b06-9d41-036b09ea700c", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85b9d877c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca", Pod:"calico-kube-controllers-85b9d877c4-cl8lx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidfdb211140a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.969 [INFO][4447] k8s.go 578: Cleaning up netns ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.969 [INFO][4447] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" iface="eth0" netns="" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.969 [INFO][4447] k8s.go 585: Releasing IP address(es) ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.969 [INFO][4447] utils.go 188: Calico CNI releasing IP address ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.985 [INFO][4454] ipam_plugin.go 415: Releasing address using handleID ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.985 [INFO][4454] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.985 [INFO][4454] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.994 [WARNING][4454] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.995 [INFO][4454] ipam_plugin.go 443: Releasing address using workloadID ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.996 [INFO][4454] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:33.998575 env[1153]: 2024-02-12 19:41:33.997 [INFO][4447] k8s.go 591: Teardown processing complete. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:33.999022 env[1153]: time="2024-02-12T19:41:33.998607919Z" level=info msg="TearDown network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" successfully" Feb 12 19:41:33.999022 env[1153]: time="2024-02-12T19:41:33.998642919Z" level=info msg="StopPodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" returns successfully" Feb 12 19:41:33.999066 env[1153]: time="2024-02-12T19:41:33.999013558Z" level=info msg="RemovePodSandbox for \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\"" Feb 12 19:41:33.999066 env[1153]: time="2024-02-12T19:41:33.999041158Z" level=info msg="Forcibly stopping sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\"" Feb 12 19:41:34.058000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:34.058000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002c5b340 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:41:34.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:34.061000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:34.061000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40027ed8a0 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:41:34.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.031 [WARNING][4478] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0", GenerateName:"calico-kube-controllers-85b9d877c4-", Namespace:"calico-system", SelfLink:"", UID:"2ed2d7d4-a83b-4b06-9d41-036b09ea700c", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85b9d877c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff8353d0511c2772473be1706cee92a200d271fc2446a71492bac7dfad7906ca", Pod:"calico-kube-controllers-85b9d877c4-cl8lx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidfdb211140a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.031 [INFO][4478] k8s.go 578: Cleaning up netns ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.031 [INFO][4478] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" iface="eth0" netns="" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.031 [INFO][4478] k8s.go 585: Releasing IP address(es) ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.032 [INFO][4478] utils.go 188: Calico CNI releasing IP address ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.048 [INFO][4486] ipam_plugin.go 415: Releasing address using handleID ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.048 [INFO][4486] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.048 [INFO][4486] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.058 [WARNING][4486] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.058 [INFO][4486] ipam_plugin.go 443: Releasing address using workloadID ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" HandleID="k8s-pod-network.854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Workload="localhost-k8s-calico--kube--controllers--85b9d877c4--cl8lx-eth0" Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.060 [INFO][4486] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:34.063448 env[1153]: 2024-02-12 19:41:34.062 [INFO][4478] k8s.go 591: Teardown processing complete. ContainerID="854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90" Feb 12 19:41:34.063830 env[1153]: time="2024-02-12T19:41:34.063471227Z" level=info msg="TearDown network for sandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" successfully" Feb 12 19:41:34.064000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:34.064000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002c5b360 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:41:34.064000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:34.066083 env[1153]: time="2024-02-12T19:41:34.066043827Z" level=info msg="RemovePodSandbox \"854d94542b2a3999c484188a7199596c5861c32e598d7b3f62d818097122cd90\" returns successfully" Feb 12 19:41:34.066479 env[1153]: time="2024-02-12T19:41:34.066448827Z" level=info msg="StopPodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\"" Feb 12 19:41:34.068000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:34.068000 audit[1925]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40011bdc00 a2=fc6 a3=0 items=0 ppid=1760 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c869 key=(null) Feb 12 19:41:34.068000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.104 [WARNING][4508] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--m5s2b-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"63bb7fde-eb42-4081-bbdf-4ab7af48beae", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84", Pod:"coredns-787d4945fb-m5s2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e1563fd68b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.104 [INFO][4508] k8s.go 578: Cleaning up netns ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.104 [INFO][4508] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" iface="eth0" netns="" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.104 [INFO][4508] k8s.go 585: Releasing IP address(es) ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.104 [INFO][4508] utils.go 188: Calico CNI releasing IP address ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.120 [INFO][4516] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.120 [INFO][4516] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.121 [INFO][4516] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.130 [WARNING][4516] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.130 [INFO][4516] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.131 [INFO][4516] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:34.134084 env[1153]: 2024-02-12 19:41:34.132 [INFO][4508] k8s.go 591: Teardown processing complete. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.134610 env[1153]: time="2024-02-12T19:41:34.134119415Z" level=info msg="TearDown network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" successfully" Feb 12 19:41:34.134610 env[1153]: time="2024-02-12T19:41:34.134151095Z" level=info msg="StopPodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" returns successfully" Feb 12 19:41:34.134610 env[1153]: time="2024-02-12T19:41:34.134550495Z" level=info msg="RemovePodSandbox for \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\"" Feb 12 19:41:34.134610 env[1153]: time="2024-02-12T19:41:34.134584335Z" level=info msg="Forcibly stopping sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\"" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.192 [WARNING][4539] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--m5s2b-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"63bb7fde-eb42-4081-bbdf-4ab7af48beae", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2799f2ea8e06c850c2c97c2b36043ed1b1d90ff5b078668bf16aba33ec50ab84", Pod:"coredns-787d4945fb-m5s2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e1563fd68b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.193 [INFO][4539] k8s.go 578: Cleaning up netns ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.193 [INFO][4539] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" iface="eth0" netns="" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.194 [INFO][4539] k8s.go 585: Releasing IP address(es) ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.194 [INFO][4539] utils.go 188: Calico CNI releasing IP address ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.209 [INFO][4547] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.210 [INFO][4547] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.210 [INFO][4547] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.219 [WARNING][4547] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.219 [INFO][4547] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" HandleID="k8s-pod-network.e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Workload="localhost-k8s-coredns--787d4945fb--m5s2b-eth0" Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.224 [INFO][4547] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:34.226429 env[1153]: 2024-02-12 19:41:34.225 [INFO][4539] k8s.go 591: Teardown processing complete. ContainerID="e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3" Feb 12 19:41:34.227024 env[1153]: time="2024-02-12T19:41:34.226450199Z" level=info msg="TearDown network for sandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" successfully" Feb 12 19:41:34.229130 env[1153]: time="2024-02-12T19:41:34.229099998Z" level=info msg="RemovePodSandbox \"e1b2321b0691043f4b44a4edf584783a676f766fa1d5b7512ee272ee68ffe0e3\" returns successfully" Feb 12 19:41:34.229570 env[1153]: time="2024-02-12T19:41:34.229547038Z" level=info msg="StopPodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\"" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.262 [WARNING][4570] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--gfkrt-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6d639f2a-4069-400b-8214-b7e86392dee6", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec", Pod:"coredns-787d4945fb-gfkrt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7584dd44ff7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.263 [INFO][4570] k8s.go 578: Cleaning up netns ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.263 [INFO][4570] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" iface="eth0" netns="" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.263 [INFO][4570] k8s.go 585: Releasing IP address(es) ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.263 [INFO][4570] utils.go 188: Calico CNI releasing IP address ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.284 [INFO][4578] ipam_plugin.go 415: Releasing address using handleID ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.284 [INFO][4578] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.284 [INFO][4578] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.294 [WARNING][4578] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.294 [INFO][4578] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.296 [INFO][4578] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:34.298818 env[1153]: 2024-02-12 19:41:34.297 [INFO][4570] k8s.go 591: Teardown processing complete. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.299249 env[1153]: time="2024-02-12T19:41:34.298856266Z" level=info msg="TearDown network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" successfully" Feb 12 19:41:34.299249 env[1153]: time="2024-02-12T19:41:34.298889546Z" level=info msg="StopPodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" returns successfully" Feb 12 19:41:34.299384 env[1153]: time="2024-02-12T19:41:34.299325546Z" level=info msg="RemovePodSandbox for \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\"" Feb 12 19:41:34.299420 env[1153]: time="2024-02-12T19:41:34.299373466Z" level=info msg="Forcibly stopping sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\"" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.332 [WARNING][4601] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--787d4945fb--gfkrt-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6d639f2a-4069-400b-8214-b7e86392dee6", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"33ba78018028383cfb0a50c4501ae082227cb37b5146ce91e72d653e358923ec", Pod:"coredns-787d4945fb-gfkrt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7584dd44ff7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.332 [INFO][4601] k8s.go 578: Cleaning up netns ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.332 [INFO][4601] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" iface="eth0" netns="" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.332 [INFO][4601] k8s.go 585: Releasing IP address(es) ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.332 [INFO][4601] utils.go 188: Calico CNI releasing IP address ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.348 [INFO][4610] ipam_plugin.go 415: Releasing address using handleID ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.348 [INFO][4610] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.348 [INFO][4610] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.364 [WARNING][4610] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.364 [INFO][4610] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" HandleID="k8s-pod-network.b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Workload="localhost-k8s-coredns--787d4945fb--gfkrt-eth0" Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.368 [INFO][4610] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:34.371989 env[1153]: 2024-02-12 19:41:34.370 [INFO][4601] k8s.go 591: Teardown processing complete. ContainerID="b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24" Feb 12 19:41:34.371989 env[1153]: time="2024-02-12T19:41:34.371961853Z" level=info msg="TearDown network for sandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" successfully" Feb 12 19:41:34.374521 env[1153]: time="2024-02-12T19:41:34.374460053Z" level=info msg="RemovePodSandbox \"b7a7f3578069653f7ea8aa0136cb596cc6f6071d873f83f929a8c0ee0648ae24\" returns successfully" Feb 12 19:41:38.621684 systemd[1]: Started sshd@11-10.0.0.3:22-10.0.0.1:54022.service. Feb 12 19:41:38.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.3:22-10.0.0.1:54022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.622766 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:41:38.624202 kernel: audit: type=1130 audit(1707766898.621:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.3:22-10.0.0.1:54022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.678000 audit[4640]: USER_ACCT pid=4640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.679173 sshd[4640]: Accepted publickey for core from 10.0.0.1 port 54022 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:38.680650 sshd[4640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:38.679000 audit[4640]: CRED_ACQ pid=4640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.683815 kernel: audit: type=1101 audit(1707766898.678:1379): pid=4640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.683888 kernel: audit: type=1103 audit(1707766898.679:1380): pid=4640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.683923 kernel: audit: type=1006 audit(1707766898.679:1381): pid=4640 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:41:38.685280 kernel: audit: type=1300 audit(1707766898.679:1381): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd7bee40 a2=3 a3=1 items=0 ppid=1 pid=4640 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:38.679000 audit[4640]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd7bee40 a2=3 a3=1 items=0 ppid=1 pid=4640 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:38.684475 systemd-logind[1139]: New session 12 of user core. Feb 12 19:41:38.685002 systemd[1]: Started session-12.scope. Feb 12 19:41:38.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:38.687661 kernel: audit: type=1327 audit(1707766898.679:1381): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:38.688000 audit[4640]: USER_START pid=4640 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.689000 audit[4642]: CRED_ACQ pid=4642 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.693853 kernel: audit: type=1105 audit(1707766898.688:1382): pid=4640 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.694069 kernel: audit: type=1103 audit(1707766898.689:1383): pid=4642 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.794389 sshd[4640]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:38.795000 audit[4640]: USER_END pid=4640 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.795000 audit[4640]: CRED_DISP pid=4640 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.798305 systemd[1]: sshd@11-10.0.0.3:22-10.0.0.1:54022.service: Deactivated successfully. Feb 12 19:41:38.798976 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:41:38.799596 systemd-logind[1139]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:41:38.800180 kernel: audit: type=1106 audit(1707766898.795:1384): pid=4640 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.800236 kernel: audit: type=1104 audit(1707766898.795:1385): pid=4640 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.3:22-10.0.0.1:54022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.800849 systemd[1]: Started sshd@12-10.0.0.3:22-10.0.0.1:54028.service. Feb 12 19:41:38.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.3:22-10.0.0.1:54028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.801625 systemd-logind[1139]: Removed session 12. Feb 12 19:41:38.843000 audit[4654]: USER_ACCT pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.844007 sshd[4654]: Accepted publickey for core from 10.0.0.1 port 54028 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:38.844000 audit[4654]: CRED_ACQ pid=4654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.844000 audit[4654]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff80eef0 a2=3 a3=1 items=0 ppid=1 pid=4654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:38.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:38.845328 sshd[4654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:38.852600 systemd-logind[1139]: New session 13 of user core. Feb 12 19:41:38.853333 systemd[1]: Started session-13.scope. Feb 12 19:41:38.862000 audit[4654]: USER_START pid=4654 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:38.863000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:39.890763 sshd[4654]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:39.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.3:22-10.0.0.1:54044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:39.892719 systemd[1]: Started sshd@13-10.0.0.3:22-10.0.0.1:54044.service. Feb 12 19:41:39.895000 audit[4654]: USER_END pid=4654 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:39.895000 audit[4654]: CRED_DISP pid=4654 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:39.897508 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:41:39.898338 systemd[1]: sshd@12-10.0.0.3:22-10.0.0.1:54028.service: Deactivated successfully. Feb 12 19:41:39.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.3:22-10.0.0.1:54028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:39.899487 systemd-logind[1139]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:41:39.900263 systemd-logind[1139]: Removed session 13. Feb 12 19:41:39.948000 audit[4664]: USER_ACCT pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:39.949421 sshd[4664]: Accepted publickey for core from 10.0.0.1 port 54044 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:39.949000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:39.949000 audit[4664]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7d49ae0 a2=3 a3=1 items=0 ppid=1 pid=4664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:39.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:39.950381 sshd[4664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:39.955416 systemd[1]: Started session-14.scope. Feb 12 19:41:39.955613 systemd-logind[1139]: New session 14 of user core. Feb 12 19:41:39.958000 audit[4664]: USER_START pid=4664 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:39.960000 audit[4667]: CRED_ACQ pid=4667 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:40.076644 sshd[4664]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:40.077000 audit[4664]: USER_END pid=4664 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:40.077000 audit[4664]: CRED_DISP pid=4664 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:40.079419 systemd[1]: sshd@13-10.0.0.3:22-10.0.0.1:54044.service: Deactivated successfully. Feb 12 19:41:40.080183 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:41:40.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.3:22-10.0.0.1:54044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:40.081327 systemd-logind[1139]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:41:40.082067 systemd-logind[1139]: Removed session 14. Feb 12 19:41:41.831557 kubelet[2039]: E0212 19:41:41.831525 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:41:45.081421 systemd[1]: Started sshd@14-10.0.0.3:22-10.0.0.1:37986.service. Feb 12 19:41:45.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.3:22-10.0.0.1:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.084041 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:41:45.084135 kernel: audit: type=1130 audit(1707766905.081:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.3:22-10.0.0.1:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.125000 audit[4685]: USER_ACCT pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.125906 sshd[4685]: Accepted publickey for core from 10.0.0.1 port 37986 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:45.127588 sshd[4685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:45.126000 audit[4685]: CRED_ACQ pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.130367 kernel: audit: type=1101 audit(1707766905.125:1406): pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.130424 kernel: audit: type=1103 audit(1707766905.126:1407): pid=4685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.130459 kernel: audit: type=1006 audit(1707766905.126:1408): pid=4685 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:41:45.130976 systemd-logind[1139]: New session 15 of user core. Feb 12 19:41:45.131833 kernel: audit: type=1300 audit(1707766905.126:1408): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda67e160 a2=3 a3=1 items=0 ppid=1 pid=4685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.126000 audit[4685]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda67e160 a2=3 a3=1 items=0 ppid=1 pid=4685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.131932 systemd[1]: Started session-15.scope. Feb 12 19:41:45.134085 kernel: audit: type=1327 audit(1707766905.126:1408): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:45.126000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:45.135000 audit[4685]: USER_START pid=4685 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.136000 audit[4687]: CRED_ACQ pid=4687 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.140674 kernel: audit: type=1105 audit(1707766905.135:1409): pid=4685 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.140733 kernel: audit: type=1103 audit(1707766905.136:1410): pid=4687 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.244525 sshd[4685]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:45.244000 audit[4685]: USER_END pid=4685 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.245000 audit[4685]: CRED_DISP pid=4685 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.248188 systemd[1]: sshd@14-10.0.0.3:22-10.0.0.1:37986.service: Deactivated successfully. Feb 12 19:41:45.248850 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:41:45.249430 systemd-logind[1139]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:41:45.250470 kernel: audit: type=1106 audit(1707766905.244:1411): pid=4685 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.250523 kernel: audit: type=1104 audit(1707766905.245:1412): pid=4685 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.3:22-10.0.0.1:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.250611 systemd[1]: Started sshd@15-10.0.0.3:22-10.0.0.1:37990.service. Feb 12 19:41:45.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.3:22-10.0.0.1:37990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.251736 systemd-logind[1139]: Removed session 15. Feb 12 19:41:45.292000 audit[4698]: USER_ACCT pid=4698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.293257 sshd[4698]: Accepted publickey for core from 10.0.0.1 port 37990 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:45.293000 audit[4698]: CRED_ACQ pid=4698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.293000 audit[4698]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0f8cba0 a2=3 a3=1 items=0 ppid=1 pid=4698 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.293000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:45.294372 sshd[4698]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:45.297688 systemd-logind[1139]: New session 16 of user core. Feb 12 19:41:45.298553 systemd[1]: Started session-16.scope. Feb 12 19:41:45.302000 audit[4698]: USER_START pid=4698 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.303000 audit[4700]: CRED_ACQ pid=4700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.518589 sshd[4698]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:45.519000 audit[4698]: USER_END pid=4698 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.519000 audit[4698]: CRED_DISP pid=4698 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.521764 systemd[1]: sshd@15-10.0.0.3:22-10.0.0.1:37990.service: Deactivated successfully. Feb 12 19:41:45.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.3:22-10.0.0.1:37990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.522608 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:41:45.523234 systemd-logind[1139]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:41:45.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.3:22-10.0.0.1:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.524482 systemd[1]: Started sshd@16-10.0.0.3:22-10.0.0.1:38004.service. Feb 12 19:41:45.525258 systemd-logind[1139]: Removed session 16. Feb 12 19:41:45.572000 audit[4710]: USER_ACCT pid=4710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.573570 sshd[4710]: Accepted publickey for core from 10.0.0.1 port 38004 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:45.574000 audit[4710]: CRED_ACQ pid=4710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.574000 audit[4710]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee369430 a2=3 a3=1 items=0 ppid=1 pid=4710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:45.575540 sshd[4710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:45.580545 systemd[1]: Started session-17.scope. Feb 12 19:41:45.581051 systemd-logind[1139]: New session 17 of user core. Feb 12 19:41:45.584000 audit[4710]: USER_START pid=4710 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:45.585000 audit[4712]: CRED_ACQ pid=4712 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.394638 sshd[4710]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:46.398137 systemd[1]: Started sshd@17-10.0.0.3:22-10.0.0.1:38018.service. Feb 12 19:41:46.397000 audit[4710]: USER_END pid=4710 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.397000 audit[4710]: CRED_DISP pid=4710 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.3:22-10.0.0.1:38018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:46.398957 systemd[1]: sshd@16-10.0.0.3:22-10.0.0.1:38004.service: Deactivated successfully. Feb 12 19:41:46.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.3:22-10.0.0.1:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:46.399860 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:41:46.400394 systemd-logind[1139]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:41:46.401177 systemd-logind[1139]: Removed session 17. Feb 12 19:41:46.435000 audit[4753]: NETFILTER_CFG table=filter:129 family=2 entries=18 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:46.435000 audit[4753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffd70e59a0 a2=0 a3=ffffa789c6c0 items=0 ppid=2256 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:46.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:46.436000 audit[4753]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:46.436000 audit[4753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd70e59a0 a2=0 a3=ffffa789c6c0 items=0 ppid=2256 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:46.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:46.445000 audit[4735]: USER_ACCT pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.446571 sshd[4735]: Accepted publickey for core from 10.0.0.1 port 38018 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:46.447000 audit[4735]: CRED_ACQ pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.447000 audit[4735]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1a7a870 a2=3 a3=1 items=0 ppid=1 pid=4735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:46.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:46.448202 sshd[4735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:46.452683 systemd[1]: Started session-18.scope. Feb 12 19:41:46.452856 systemd-logind[1139]: New session 18 of user core. Feb 12 19:41:46.456000 audit[4735]: USER_START pid=4735 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.457000 audit[4765]: CRED_ACQ pid=4765 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.476000 audit[4780]: NETFILTER_CFG table=filter:131 family=2 entries=30 op=nft_register_rule pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:46.476000 audit[4780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=fffffa53ed10 a2=0 a3=ffffb60f66c0 items=0 ppid=2256 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:46.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:46.478000 audit[4780]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:46.478000 audit[4780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffffa53ed10 a2=0 a3=ffffb60f66c0 items=0 ppid=2256 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:46.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:46.661727 sshd[4735]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:46.667000 audit[4735]: USER_END pid=4735 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.667000 audit[4735]: CRED_DISP pid=4735 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.669922 systemd[1]: sshd@17-10.0.0.3:22-10.0.0.1:38018.service: Deactivated successfully. Feb 12 19:41:46.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.3:22-10.0.0.1:38018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:46.670600 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:41:46.671196 systemd-logind[1139]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:41:46.672361 systemd[1]: Started sshd@18-10.0.0.3:22-10.0.0.1:38020.service. Feb 12 19:41:46.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:38020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:46.673341 systemd-logind[1139]: Removed session 18. Feb 12 19:41:46.719000 audit[4790]: USER_ACCT pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.719896 sshd[4790]: Accepted publickey for core from 10.0.0.1 port 38020 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:46.720000 audit[4790]: CRED_ACQ pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.720000 audit[4790]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7014f70 a2=3 a3=1 items=0 ppid=1 pid=4790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:46.720000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:46.721413 sshd[4790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:46.725543 systemd-logind[1139]: New session 19 of user core. Feb 12 19:41:46.726362 systemd[1]: Started session-19.scope. Feb 12 19:41:46.729000 audit[4790]: USER_START pid=4790 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.730000 audit[4792]: CRED_ACQ pid=4792 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.838277 sshd[4790]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:46.838000 audit[4790]: USER_END pid=4790 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.839000 audit[4790]: CRED_DISP pid=4790 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:46.841475 systemd[1]: sshd@18-10.0.0.3:22-10.0.0.1:38020.service: Deactivated successfully. Feb 12 19:41:46.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:38020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:46.842274 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:41:46.843257 systemd-logind[1139]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:41:46.844392 systemd-logind[1139]: Removed session 19. Feb 12 19:41:51.033000 audit[4860]: NETFILTER_CFG table=filter:133 family=2 entries=18 op=nft_register_rule pid=4860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:51.035624 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:41:51.035684 kernel: audit: type=1325 audit(1707766911.033:1454): table=filter:133 family=2 entries=18 op=nft_register_rule pid=4860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:51.033000 audit[4860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffedb6d980 a2=0 a3=ffff85a916c0 items=0 ppid=2256 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:51.038568 kernel: audit: type=1300 audit(1707766911.033:1454): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffedb6d980 a2=0 a3=ffff85a916c0 items=0 ppid=2256 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:51.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:51.040543 kernel: audit: type=1327 audit(1707766911.033:1454): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:51.038000 audit[4860]: NETFILTER_CFG table=nat:134 family=2 entries=162 op=nft_register_chain pid=4860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:51.038000 audit[4860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=ffffedb6d980 a2=0 a3=ffff85a916c0 items=0 ppid=2256 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:51.049785 kernel: audit: type=1325 audit(1707766911.038:1455): table=nat:134 family=2 entries=162 op=nft_register_chain pid=4860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:51.049859 kernel: audit: type=1300 audit(1707766911.038:1455): arch=c00000b7 syscall=211 success=yes exit=66940 a0=3 a1=ffffedb6d980 a2=0 a3=ffff85a916c0 items=0 ppid=2256 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:51.049884 kernel: audit: type=1327 audit(1707766911.038:1455): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:51.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:51.842516 systemd[1]: Started sshd@19-10.0.0.3:22-10.0.0.1:38028.service. Feb 12 19:41:51.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:38028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:51.845520 kernel: audit: type=1130 audit(1707766911.842:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:38028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:51.888000 audit[4863]: USER_ACCT pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:51.891742 sshd[4863]: Accepted publickey for core from 10.0.0.1 port 38028 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:51.892531 kernel: audit: type=1101 audit(1707766911.888:1457): pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:51.893000 audit[4863]: CRED_ACQ pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:51.896301 sshd[4863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:51.897388 kernel: audit: type=1103 audit(1707766911.893:1458): pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:51.897467 kernel: audit: type=1006 audit(1707766911.895:1459): pid=4863 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 12 19:41:51.895000 audit[4863]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe467030 a2=3 a3=1 items=0 ppid=1 pid=4863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:51.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:51.901153 systemd-logind[1139]: New session 20 of user core. Feb 12 19:41:51.902716 systemd[1]: Started session-20.scope. Feb 12 19:41:51.907000 audit[4863]: USER_START pid=4863 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:51.908000 audit[4865]: CRED_ACQ pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:52.015363 sshd[4863]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:52.016000 audit[4863]: USER_END pid=4863 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:52.016000 audit[4863]: CRED_DISP pid=4863 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:52.018660 systemd[1]: sshd@19-10.0.0.3:22-10.0.0.1:38028.service: Deactivated successfully. Feb 12 19:41:52.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:38028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:52.019404 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:41:52.020393 systemd-logind[1139]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:41:52.022799 systemd-logind[1139]: Removed session 20. Feb 12 19:41:57.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:51936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:57.019820 systemd[1]: Started sshd@20-10.0.0.3:22-10.0.0.1:51936.service. Feb 12 19:41:57.020663 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:41:57.020702 kernel: audit: type=1130 audit(1707766917.019:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:51936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:57.064000 audit[4876]: USER_ACCT pid=4876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.064836 sshd[4876]: Accepted publickey for core from 10.0.0.1 port 51936 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:41:57.066252 sshd[4876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:57.065000 audit[4876]: CRED_ACQ pid=4876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.069791 kernel: audit: type=1101 audit(1707766917.064:1466): pid=4876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.069860 kernel: audit: type=1103 audit(1707766917.065:1467): pid=4876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.069880 kernel: audit: type=1006 audit(1707766917.065:1468): pid=4876 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 19:41:57.069399 systemd-logind[1139]: New session 21 of user core. Feb 12 19:41:57.070209 systemd[1]: Started session-21.scope. Feb 12 19:41:57.065000 audit[4876]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdad095d0 a2=3 a3=1 items=0 ppid=1 pid=4876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:57.073900 kernel: audit: type=1300 audit(1707766917.065:1468): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdad095d0 a2=3 a3=1 items=0 ppid=1 pid=4876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:57.073975 kernel: audit: type=1327 audit(1707766917.065:1468): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:57.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:57.073000 audit[4876]: USER_START pid=4876 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.077544 kernel: audit: type=1105 audit(1707766917.073:1469): pid=4876 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.074000 audit[4878]: CRED_ACQ pid=4878 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.079727 kernel: audit: type=1103 audit(1707766917.074:1470): pid=4878 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.186909 sshd[4876]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:57.192976 kernel: audit: type=1106 audit(1707766917.187:1471): pid=4876 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.193042 kernel: audit: type=1104 audit(1707766917.187:1472): pid=4876 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.187000 audit[4876]: USER_END pid=4876 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.187000 audit[4876]: CRED_DISP pid=4876 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:41:57.189531 systemd[1]: sshd@20-10.0.0.3:22-10.0.0.1:51936.service: Deactivated successfully. Feb 12 19:41:57.190260 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:41:57.190735 systemd-logind[1139]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:41:57.191365 systemd-logind[1139]: Removed session 21. Feb 12 19:41:57.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:51936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:57.830752 kubelet[2039]: E0212 19:41:57.830723 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:42:01.830612 kubelet[2039]: E0212 19:42:01.830583 2039 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:42:02.192045 systemd[1]: Started sshd@21-10.0.0.3:22-10.0.0.1:51948.service. Feb 12 19:42:02.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:02.193033 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:42:02.193083 kernel: audit: type=1130 audit(1707766922.191:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:02.235000 audit[4892]: USER_ACCT pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.235963 sshd[4892]: Accepted publickey for core from 10.0.0.1 port 51948 ssh2: RSA SHA256:pSXGQK2T5oSLzXStHZmhHPwtlknlpJh3a194s+daB5c Feb 12 19:42:02.237230 sshd[4892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:02.236000 audit[4892]: CRED_ACQ pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.240531 kernel: audit: type=1101 audit(1707766922.235:1475): pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.240600 kernel: audit: type=1103 audit(1707766922.236:1476): pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.240630 kernel: audit: type=1006 audit(1707766922.236:1477): pid=4892 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 19:42:02.241908 kernel: audit: type=1300 audit(1707766922.236:1477): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeaf7ddd0 a2=3 a3=1 items=0 ppid=1 pid=4892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.236000 audit[4892]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeaf7ddd0 a2=3 a3=1 items=0 ppid=1 pid=4892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.243343 systemd-logind[1139]: New session 22 of user core. Feb 12 19:42:02.243818 systemd[1]: Started session-22.scope. Feb 12 19:42:02.236000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:02.245102 kernel: audit: type=1327 audit(1707766922.236:1477): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:02.247000 audit[4892]: USER_START pid=4892 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.250512 kernel: audit: type=1105 audit(1707766922.247:1478): pid=4892 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.250570 kernel: audit: type=1103 audit(1707766922.248:1479): pid=4894 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.248000 audit[4894]: CRED_ACQ pid=4894 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.356520 sshd[4892]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:02.357000 audit[4892]: USER_END pid=4892 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.357000 audit[4892]: CRED_DISP pid=4892 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.359243 systemd-logind[1139]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:42:02.359402 systemd[1]: sshd@21-10.0.0.3:22-10.0.0.1:51948.service: Deactivated successfully. Feb 12 19:42:02.360132 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:42:02.361024 systemd-logind[1139]: Removed session 22. Feb 12 19:42:02.362435 kernel: audit: type=1106 audit(1707766922.357:1480): pid=4892 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.362500 kernel: audit: type=1104 audit(1707766922.357:1481): pid=4892 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:42:02.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'